Vulnerabilites related to cisco - catos
Vulnerability from fkie_nvd
Published
2001-02-16 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.
Impacted products
Vendor Product Version
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 5.1
cisco catos 5.1\(1\)
cisco catos 5.1\(1a\)
cisco catos 5.1\(2a\)
cisco catos 5.2
cisco catos 5.2\(1\)
cisco catos 5.2\(1a\)
cisco catos 5.2\(2\)
cisco catos 5.2\(3\)
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.3\(1\)csx
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(2\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "851920E3-2DF8-4C74-84E0-E3950D2EA672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFAF3474-E030-4AF5-8BE0-966191D15E16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C8EF024C-80B1-4332-ADDC-992C5F933562",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6323C88E-C966-42FC-957F-EC244744A5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9229B19E-B65E-4C23-8F35-7019050E24B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "587031FB-E0AF-4BD0-8809-8690D3814F3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2055E432-9939-48F7-A4BE-1888CC7241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21CF907-707A-43CA-984C-310062705C63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "46DC4972-7FA1-4320-83E6-607D139121EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "339DDB07-6C16-43B9-A880-77E2351B1C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBCB451E-8945-408C-94F5-36C43AA05C1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7F30211-BB7A-41D3-946F-655C028A3772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE0EAB-F266-437A-B615-69536AF50B49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD50773D-8E63-45C7-A52D-D7B13F65327F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "282793F1-296C-423A-9A2D-301DC3340664",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "020B669B-DE6B-4828-BB44-D99EE576B79D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.",
      },
   ],
   id: "CVE-2001-0041",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-02-16T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/801",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2072",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/801",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2072",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2002-10-28 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.
Impacted products
Vendor Product Version
cisco catos 5.4
cisco catos 5.5
cisco catos 5.5\(13a\)
cisco catos 6.1
cisco catos 6.1\(2\)
cisco catos 7.3
cisco catos 7.4



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE0EAB-F266-437A-B615-69536AF50B49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BF90D0A9-302D-4C66-B145-1EAC5EEBFC3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7B5E1E-5698-4F69-AB53-C9F6339758C9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en el servidor HTTP embebido en conmutadores Cisco Catalyst corriendo CatOS 5.4 a 7.3 permite a atacantes remotos causar una denegación de servicio (reset) mediante una petición HTTP larga.",
      },
   ],
   id: "CVE-2002-1222",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2002-10-28T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.iss.net/security_center/static/10382.php",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/5976",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.iss.net/security_center/static/10382.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/5976",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-119",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
Impacted products
Vendor Product Version
cisco ios 12.0da
cisco ios 12.0db
cisco ios 12.0dc
cisco ios 12.0s
cisco ios 12.0sc
cisco ios 12.0sl
cisco ios 12.0st
cisco ios 12.0t
cisco ios 12.0xa
cisco ios 12.0xb
cisco ios 12.0xc
cisco ios 12.0xd
cisco ios 12.0xe
cisco ios 12.0xf
cisco ios 12.0xg
cisco ios 12.0xh
cisco ios 12.0xi
cisco ios 12.0xj
cisco ios 12.0xk
cisco ios 12.0xl
cisco ios 12.0xm
cisco ios 12.0xn
cisco ios 12.0xp
cisco ios 12.0xq
cisco ios 12.0xr
cisco ios 12.0xs
cisco ios 12.0xu
cisco ios 12.0xv
cisco ios 12.0xw
cisco ios 12.1
cisco ios 12.1aa
cisco ios 12.1cx
cisco ios 12.1da
cisco ios 12.1db
cisco ios 12.1dc
cisco ios 12.1e
cisco ios 12.1ea
cisco ios 12.1ec
cisco ios 12.1ex
cisco ios 12.1t
cisco ios 12.1xa
cisco ios 12.1xb
cisco ios 12.1xc
cisco ios 12.1xd
cisco ios 12.1xe
cisco ios 12.1xf
cisco ios 12.1xg
cisco ios 12.1xh
cisco ios 12.1xi
cisco ios 12.1xk
cisco ios 12.1xl
cisco ios 12.1xm
cisco ios 12.1xp
cisco ios 12.1xq
cisco ios 12.1xr
cisco ios 12.1xs
cisco ios 12.1xt
cisco ios 12.1xu
cisco ios 12.1xv
cisco ios 12.1xw
cisco ios 12.1xx
cisco ios 12.1xy
cisco ios 12.1xz
cisco ios 12.1ya
cisco ios 12.1yb
cisco ios 12.1yc
cisco ios 12.1yd
cisco catos 5.5
cisco catos 6.1



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
                     matchCriteriaId: "12434A88-88C6-4749-981F-E2B4D725F48F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C398460-3F38-4AA7-A4B1-FD8A01588DB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
                     matchCriteriaId: "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B6B0C2F-2FBE-4422-AD30-305100C595CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBEA01D2-B985-4575-AF00-144CE2E3024D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7F94E8-86FC-456B-A7BB-57953F67F754",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
                     matchCriteriaId: "1050ACB3-E5B2-4710-910B-F3DF4B49907F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABE71F9-17D4-47C4-A762-18CC8716E477",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
                     matchCriteriaId: "7977DA9F-41DE-4482-B0CD-896EEEFB5689",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
                     matchCriteriaId: "1ADAB898-7728-4C14-B69A-7B8B06AFC894",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*",
                     matchCriteriaId: "DDBE69A0-85B1-423B-88FB-CDA80E9186EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
                     matchCriteriaId: "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
                     matchCriteriaId: "54424787-34AC-410D-985F-511ADB2BB144",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
                     matchCriteriaId: "70F54F0C-AC91-4CB7-9FEB-257F03547864",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6A0D017-F26F-4429-891E-C7E1C66B6588",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
                     matchCriteriaId: "26FA075D-4A9E-44EE-90CF-23947C9040EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A3DFAEC-4534-4A8D-9886-0723F57C7A63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5451772-87D4-42E2-8F48-D137670DA3E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
                     matchCriteriaId: "D162976F-87A3-42BF-8C9F-A981B14F4673",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2606209-91BE-4BEB-A163-0D3873A033FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
                     matchCriteriaId: "43581A57-418A-4A35-ACF2-1380A8DA8A82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC17E231-9256-4600-A33B-238E7E83CF85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A6D5468-BB6A-4665-964F-D8F636359CCD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D0082D5-CE3E-433A-84E9-1311C8B7899A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED30640-AABE-4CA2-8B45-509270748BBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
                     matchCriteriaId: "FDEF6AED-4477-4AAC-9759-1996B77DFEE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9427851-B0DC-4CE6-8BFA-60619D1DC87C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D07DD94-0925-4FEE-9565-5F36B9AAF448",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC3A67F5-05C6-4097-A88E-0A0F165C12EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "7126E176-D739-4102-8F10-1EEB8C6A219D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
                     matchCriteriaId: "E90C0554-1A50-4341-AB07-80AA854673D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "46FF39C5-CC37-4573-BB18-36254D38509B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4A85892-C3AB-4920-A949-A71BD0332D62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
                     matchCriteriaId: "752C3C6B-910D-4153-A162-DF255F60306B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "297FAD97-60C0-473D-A18D-03657B81B7E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AD4A33B-B13E-40C6-B47F-A406ACC6664F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
                     matchCriteriaId: "0E488E6E-87F0-4292-B97B-31087FDB4655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D199CB1-A2A3-4678-9503-C5B61281755C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
                     matchCriteriaId: "19952DC6-1186-4754-BB1E-BA1D78A19C96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
                     matchCriteriaId: "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
                     matchCriteriaId: "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A11AF3F-C82F-4431-9CF1-84FDAD388D04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B674647-4438-4450-9DCA-25184D4E2682",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E5CC41-1344-4A65-A653-8012ACE2CF2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FB7128-CF11-4903-97D7-418403A03CD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
                     matchCriteriaId: "63EFB20A-78E2-4BA1-B87C-BB74E8982D99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A273401-9394-4BC3-879C-DE3EFC09B3F2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DABF911-FCDF-4095-A95D-4BB73628FCA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
                     matchCriteriaId: "77886493-C30E-439E-BBB4-3D34A8938378",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
                     matchCriteriaId: "7813F511-CF6D-487F-9D1C-7A6CF85AD724",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
                     matchCriteriaId: "677DC4B6-8B3D-4A0D-9934-743FD7494DF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
                     matchCriteriaId: "E272881F-0804-4190-A21D-3D0B9A774F13",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
                     matchCriteriaId: "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
                     matchCriteriaId: "F084DA16-24CB-41D1-92B7-C6E0499AAD10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA979D75-F60E-45F8-B99C-1402DC8CFCDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
                     matchCriteriaId: "194F0AB1-92E6-4CE3-A5A1-904BF75F05D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
                     matchCriteriaId: "884753D4-3AF0-4723-9D51-26BA7B4CA533",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAF3601D-DF44-4A10-A424-8E97C65A36A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.",
      },
   ],
   id: "CVE-2004-1775",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-12-31T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/645400",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/5030",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/645400",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/5030",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2005-12-15 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
Impacted products
Vendor Product Version
cisco catalyst 4.5_\(10\)
cisco catalyst sup2plus
cisco catalyst sup3
cisco catalyst_1200_series *
cisco catalyst_1900_series *
cisco catalyst_1900_series 9.0_0.07
cisco catalyst_2800_series *
cisco catalyst_2820 *
cisco catalyst_2820 9.0_0.07
cisco catalyst_2900 *
cisco catalyst_2900 lre_xl
cisco catalyst_2900 xl
cisco catalyst_2901 *
cisco catalyst_2902 *
cisco catalyst_2920 *
cisco catalyst_2926 *
cisco catalyst_2926f *
cisco catalyst_2926gl *
cisco catalyst_2926gs *
cisco catalyst_2926t *
cisco catalyst_2940 *
cisco catalyst_2948 *
cisco catalyst_2948-ge-tx *
cisco catalyst_2948g-l3 *
cisco catalyst_2950 *
cisco catalyst_2950_lre *
cisco catalyst_2955 *
cisco catalyst_2970 *
cisco catalyst_2980g *
cisco catalyst_2980g-a *
cisco catalyst_3000 *
cisco catalyst_3200 *
cisco catalyst_3500_xl *
cisco catalyst_3550 *
cisco catalyst_3560 *
cisco catalyst_3750 *
cisco catalyst_3750_metro *
cisco catalyst_3900 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4000 *
cisco catalyst_4200 *
cisco catalyst_4224 *
cisco catalyst_4232 *
cisco catalyst_4232-13 *
cisco catalyst_4500 *
cisco catalyst_4500 *
cisco catalyst_4503 *
cisco catalyst_4506 *
cisco catalyst_4507r *
cisco catalyst_4510r *
cisco catalyst_4840g *
cisco catalyst_4908g-l3 *
cisco catalyst_4912g *
cisco catalyst_4948 *
cisco catalyst_5000 *
cisco catalyst_5505 *
cisco catalyst_5509 *
cisco catalyst_6000 *
cisco catalyst_6000 *
cisco catalyst_6000 *
cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6000_ws-x6380-nam 2.1\(2\)
cisco catalyst_6000_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6500 *
cisco catalyst_6500_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6500_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6500_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6500_ws-x6380-nam 2.1\(2\)
cisco catalyst_6500_ws-x6380-nam 3.1\(1a\)
cisco catalyst_6608 *
cisco catalyst_6624 *
cisco catalyst_7600 *
cisco catalyst_7600 *
cisco catalyst_7600_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_7600_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_7600_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_7600_ws-x6380-nam 2.1\(2\)
cisco catalyst_7600_ws-x6380-nam 3.1\(1a\)
cisco catalyst_8500 *
cisco catalyst_8510csr *
cisco catalyst_8510msr *
cisco catalyst_8540csr *
cisco catalyst_8540msr *
cisco catalyst_ws-c2924-xl *
cisco catos 3.0\(7\)
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(4b\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 4.5\(10\)
cisco catos 4.5\(11\)
cisco catos 4.5\(12\)
cisco catos 4.5\(13a\)
cisco catos 5.1
cisco catos 5.1\(1\)
cisco catos 5.1\(1a\)
cisco catos 5.1\(2a\)
cisco catos 5.2
cisco catos 5.2\(1\)
cisco catos 5.2\(1a\)
cisco catos 5.2\(2\)
cisco catos 5.2\(3\)
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.3\(1\)csx
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(2\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(5\)
cisco catos 5.5\(6\)
cisco catos 5.5\(7\)
cisco catos 5.5\(13\)
cisco catos 5.5\(19\)
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(1d\)
cisco catos 6.1\(2\)
cisco catos 6.1\(2.13\)
cisco catos 6.1\(3\)
cisco catos 6.2\(0.110\)
cisco catos 6.2\(0.111\)
cisco catos 6.2\(3\)
cisco catos 6.3\(0.7\)pan
cisco catos 6.3\(4\)
cisco catos 6.3\(5\)
cisco catos 6.4\(4a\)
cisco catos 7.1
cisco catos 7.1\(2\)
cisco catos 7.2\(2\)
cisco catos 7.5\(1\)
cisco catos 7.6\(1\)
cisco catos 7.6\(2\)
cisco ios 11.2\(8.2\)sa6
cisco ios 12.0\(5.2\)xu



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E7426171-91E9-4369-88F8-469D2D70FF96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*",
                     matchCriteriaId: "2795A59A-0157-4EE3-B8B7-946DB7BEACA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF84505D-5736-46AC-8723-230EEB80870F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA369237-AEDC-42C2-BAFA-4FE370A28E52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "70F6296A-4C3C-4A88-B1A4-3EB971339F85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*",
                     matchCriteriaId: "D89FB0BB-64D2-4385-9302-FDCB05F92345",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD87934C-057F-4EB3-9B42-2136A69A5AC9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23F65F67-4C3B-42A2-ACD7-4590FF3125E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DBBC2D9-67D3-47FB-A627-7703A5440B34",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "85876B6F-DE52-4FC2-85E9-3639B2894A90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "E38034CB-72FD-4E96-A3E3-0B555EC54A7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C3745E0-4918-40AD-A219-111DC81CF766",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "26EAFC2E-8385-4A04-A761-EC54011A333C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88256AC6-6E27-40E6-9714-398DEF763D78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61F8C4A-1B97-4550-A465-3157A51E5D04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5388120C-0B85-4029-9A6C-EFFD282F23EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B539EED0-16A3-4F4F-8791-F90FDA13520B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4DA944-5B98-4BFB-90E9-C2A1C7731ECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC79C1CD-FC2D-4667-A92E-8C87ECE04128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "15CC7BDB-8C89-43AB-A514-8FC23092DE4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CFE777F-AC93-4598-A406-C437BB1FFCE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1354FE59-7DB1-4CFE-9149-40EA1CE7B000",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7C96219-7521-4F11-A222-9BCAB0B9B9D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA122273-0B84-4CE6-AAF6-F89E1F986C33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1DA518E9-3A63-4997-AC3E-2FB0B8438B82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83227C65-2708-4974-BDCE-07F9849CC921",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CF73F5A9-F3FB-476D-8309-B1E1E485C44A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC517907-C094-4B7F-8073-480DE18CDD75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "04831AE8-B21E-4674-AD14-9E98AF50D250",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*",
                     matchCriteriaId: "87DF7111-AC30-4B16-8EF9-C21E0280808F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*",
                     matchCriteriaId: "FC9179DB-C0A8-4B9C-BC17-B9EA55C9B731",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*",
                     matchCriteriaId: "F37FE8BD-1434-4F1D-B207-D5C8E48344AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*",
                     matchCriteriaId: "0F51C943-BBD4-4CAD-8F57-FABECDC469E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1F991C2-CFF1-4FCD-BD88-8B4A9FB8A9E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8348B895-7B3F-40CB-8843-02DBD28FC6F4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A299DDE-9979-4C3E-A9F4-F0519CA20AE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E27A63C6-255D-449F-B00B-4EB4060ED7E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*",
                     matchCriteriaId: "0EDF42DB-BF41-4C94-8BDB-EB37D90B77EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E25997-76B2-46FF-8426-8F40002BEE78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23267E55-E098-41F5-9B9A-E1919214B579",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "324DE8A5-FA75-4758-8775-65051504259F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "843C8691-3CB5-4C7E-A6C0-47625387CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "16867F98-C635-4507-B5A9-BD19181B1E67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83198D7C-C205-44AF-901F-6BD6D5C36244",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8473D554-26FD-4D38-92FC-EE3EE2F3D30A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F131955B-CDE7-48BC-9F64-E56BC90F2695",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "807C5AE1-F133-4F68-8BBA-FCBD7D231CF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B75201F-F007-4612-A3F0-ABC75C730F94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*",
                     matchCriteriaId: "4C6A9A84-B0B4-4560-BF84-9C0C675A37E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*",
                     matchCriteriaId: "8354057B-818A-4BCC-87C3-3EED472B17F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0BF0BBC8-04BD-4867-B188-35461E50FF16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C959C93D-D58C-4AB5-9058-0CF257C68F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EC58B690-8D30-4A04-82AA-A827F87DEE02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "41491D13-A3F9-464A-A84B-A58320838CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F918F12-DC72-45B0-B776-3F744F12F3D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DD2CF99-7556-427B-BCE5-980BBADC4294",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
                     matchCriteriaId: "5367C3D5-583A-4942-828F-DD9C8790C93A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
                     matchCriteriaId: "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6353A76-2075-4245-94C5-D23BF9C03732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "32583745-9640-4032-B1E1-598ABB4E89A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BAA00D-994D-4F18-9858-7EAC3470FBC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "793FC8D9-A500-4D21-858F-97CE380C3774",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F91A0BCA-0FB1-4389-9834-ADCE88D15A4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2C0C970-2EB3-489A-AFA5-3066B78D2A32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCA10A45-3421-48A0-82D7-1605641E0AAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD0B4EDC-0F63-4295-84B8-8E4DC7F522E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B604D3F1-98B9-487E-8E45-5BAC514689F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "851920E3-2DF8-4C74-84E0-E3950D2EA672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFAF3474-E030-4AF5-8BE0-966191D15E16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C8EF024C-80B1-4332-ADDC-992C5F933562",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5F4D6201-495A-4EEC-876F-09B58C1D700F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6323C88E-C966-42FC-957F-EC244744A5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AD63DBE5-2149-46FF-B272-2E5A3C382548",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "04E2E594-8B82-476B-96A6-C713FE1FA06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D7837C26-C795-4FAC-A11B-149C41B34A26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9229B19E-B65E-4C23-8F35-7019050E24B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "587031FB-E0AF-4BD0-8809-8690D3814F3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2055E432-9939-48F7-A4BE-1888CC7241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21CF907-707A-43CA-984C-310062705C63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "46DC4972-7FA1-4320-83E6-607D139121EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "339DDB07-6C16-43B9-A880-77E2351B1C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBCB451E-8945-408C-94F5-36C43AA05C1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7F30211-BB7A-41D3-946F-655C028A3772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE0EAB-F266-437A-B615-69536AF50B49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD50773D-8E63-45C7-A52D-D7B13F65327F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "282793F1-296C-423A-9A2D-301DC3340664",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "020B669B-DE6B-4828-BB44-D99EE576B79D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9627888A-F522-4A41-8B14-F0E7096509FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "926FC1F1-C2D1-439C-9A43-B38399A1C363",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8C9BCB53-72AA-426F-9D18-544038B65128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9CDFB025-A93A-441C-84B6-EBB0902A5559",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CE2412-CFB8-42B0-B39E-84569C922952",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1345465E-2B83-40FE-BC6B-536E0A2260D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
                     matchCriteriaId: "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3B791566-5B22-452D-ACDA-A1085700AE2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "904FC5E4-6BE0-4B15-8283-26F92922B78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8F47A997-B2A5-459D-8089-12B2AB438FB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FF76E1E2-3EE9-4560-B138-06347ECA3B4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6DED72B-DBB7-4E51-AD6D-75EE407A3817",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97C1243-BBEB-44AC-96E1-AC46F946EA42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.",
      },
      {
         lang: "es",
         value: "Conmutadores  Cisco Catalyst no especificados permiten a atacantes remotos causar una denegación de servicio (caída de dispositivo) mediante un paquete IP con IPs y puertos de origen y destino iguales y con la bandera SYN. (tcc LanD). NOTA: La proveniencia de esta cuestión es desconocida; los detalles son obtenidos exclusivamente de BID.",
      },
   ],
   id: "CVE-2005-4258",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2005-12-15T11:03:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/15864",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/15864",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-01-05 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EC58B690-8D30-4A04-82AA-A827F87DEE02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "41491D13-A3F9-464A-A84B-A58320838CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6353A76-2075-4245-94C5-D23BF9C03732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "32583745-9640-4032-B1E1-598ABB4E89A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CAFC15-178C-4176-9668-D4A04B63E77B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.",
      },
      {
         lang: "es",
         value: "El Módulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permite a atacantes remotos causar una denegación de servicio (caída y recarga) mediante SNMPv3 cuando está establecido snmp-server.",
      },
   ],
   id: "CVE-2003-1002",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-01-05T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.
Impacted products
Vendor Product Version
cisco catos 5.5\(5\)
cisco catos 6.3\(5\)
cisco catos 7.1\(2\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9627888A-F522-4A41-8B14-F0E7096509FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8F47A997-B2A5-459D-8089-12B2AB438FB0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.",
      },
   ],
   id: "CVE-2002-2316",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2002-12-31T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.iss.net/security_center/static/9148.php",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/4790",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.iss.net/security_center/static/9148.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/4790",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).
Impacted products
Vendor Product Version
cisco ios 12.0s
cisco ios 12.0sp
cisco ios 12.0st
cisco ios 12.0xb
cisco ios 12.0xm
cisco ios 12.0xv
cisco ios 12.1\(1\)ex
cisco ios 12.1\(5c\)ex
cisco ios 12.1\(8a\)ex
cisco ios 12.1\(9\)ex
cisco ios 12.1e
cisco ios 12.1ec
cisco ios 12.1t
cisco ios 12.1xb
cisco ios 12.1xc
cisco ios 12.1xf
cisco ios 12.1xg
cisco ios 12.1xh
cisco ios 12.1xi
cisco ios 12.1xj
cisco ios 12.1xl
cisco ios 12.1xm
cisco ios 12.1xp
cisco ios 12.1xq
cisco ios 12.1xt
cisco ios 12.1xu
cisco ios 12.1yb
cisco ios 12.1yc
cisco ios 12.1yd
cisco ios 12.1ye
cisco ios 12.1yf
cisco ios 12.1yi
cisco ios 12.2
cisco ios 12.2b
cisco ios 12.2bc
cisco ios 12.2da
cisco ios 12.2dd
cisco ios 12.2s
cisco ios 12.2t
cisco ios 12.2xa
cisco ios 12.2xb
cisco ios 12.2xd
cisco ios 12.2xe
cisco ios 12.2xf
cisco ios 12.2xg
cisco ios 12.2xh
cisco ios 12.2xi
cisco ios 12.2xj
cisco ios 12.2xk
cisco ios 12.2xl
cisco ios 12.2xm
cisco ios 12.2xn
cisco ios 12.2xq
cisco ios 12.2xr
cisco ios 12.2xs
cisco ios 12.2xt
cisco ios 12.2xw
cisco ios 12.2ya
cisco ios 12.2yb
cisco ios 12.2yc
cisco ios 12.2yd
cisco ios 12.2yf
cisco ios 12.2yg
cisco ios 12.2yh
cisco pix_firewall_software 5.2
cisco pix_firewall_software 5.3
cisco pix_firewall_software 6.0
cisco pix_firewall_software 6.1
cisco pix_firewall_software 6.2
cisco css11000_content_services_switch *
cisco catos 5.3\(1\)csx
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(2\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(13\)
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(2.13\)
cisco catos 6.2\(0.110\)
cisco catos 6.2\(0.111\)
cisco catos 6.3\(0.7\)pan
cisco catos 6.3\(4\)
cisco catos 7.1
cisco catos 7.1\(2\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C398460-3F38-4AA7-A4B1-FD8A01588DB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "932C1AC0-0BD1-46DF-A241-AA71BBD785BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBEA01D2-B985-4575-AF00-144CE2E3024D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABE71F9-17D4-47C4-A762-18CC8716E477",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5451772-87D4-42E2-8F48-D137670DA3E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
                     matchCriteriaId: "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*",
                     matchCriteriaId: "96541BD7-7D90-4C56-BC23-7071A07711DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*",
                     matchCriteriaId: "1637C389-A962-4695-AC35-47785C205FE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA87A2A-E394-4EA4-82BA-9CA3A561C8E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
                     matchCriteriaId: "2465A016-415C-4EE9-9DEC-B71C3EDC0BC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "7126E176-D739-4102-8F10-1EEB8C6A219D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
                     matchCriteriaId: "46FF39C5-CC37-4573-BB18-36254D38509B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
                     matchCriteriaId: "752C3C6B-910D-4153-A162-DF255F60306B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "297FAD97-60C0-473D-A18D-03657B81B7E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AD4A33B-B13E-40C6-B47F-A406ACC6664F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
                     matchCriteriaId: "19952DC6-1186-4754-BB1E-BA1D78A19C96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
                     matchCriteriaId: "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
                     matchCriteriaId: "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
                     matchCriteriaId: "80E8AF76-0A1D-4BAE-BF10-D63080352E6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B674647-4438-4450-9DCA-25184D4E2682",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "86E5CC41-1344-4A65-A653-8012ACE2CF2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
                     matchCriteriaId: "71FB7128-CF11-4903-97D7-418403A03CD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
                     matchCriteriaId: "63EFB20A-78E2-4BA1-B87C-BB74E8982D99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
                     matchCriteriaId: "77886493-C30E-439E-BBB4-3D34A8938378",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
                     matchCriteriaId: "7813F511-CF6D-487F-9D1C-7A6CF85AD724",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
                     matchCriteriaId: "884753D4-3AF0-4723-9D51-26BA7B4CA533",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
                     matchCriteriaId: "DAF3601D-DF44-4A10-A424-8E97C65A36A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1835410-77EB-46F2-ACF0-379759D4B0D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BB103ED-B170-4193-84CD-4C59F4D6A10A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D55886-268F-4E4D-B00F-8A5D97A73BA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
                     matchCriteriaId: "E314B0F7-1A27-483E-B3B3-947A5561281F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B7EA3DA-33B3-4480-B3B8-413745D6C5FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDC41749-91FC-43DB-A52F-AC3E3A2205C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D035A35-D53E-4C49-B4E4-F40B85866F27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
                     matchCriteriaId: "84900BB3-B49F-448A-9E04-FE423FBCCC4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "075CD42D-070A-49BA-90D9-E7925BB41A38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
                     matchCriteriaId: "746DDC61-3981-4E93-A7EE-C120E0265485",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
                     matchCriteriaId: "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
                     matchCriteriaId: "4628FDA0-4260-4493-92C9-4574E5EC06A2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9FA064A-6E1A-4415-84D4-1A33FF667011",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
                     matchCriteriaId: "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
                     matchCriteriaId: "21147732-FA22-4728-B5F2-D115B78A8EDB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D717498-4DF9-4D15-A25B-D777FF460E3A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B40548F-3914-4227-9E4C-F1B34071C069",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECE49281-0571-49F7-95FF-68B1ACA07537",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B09B72E-6862-4115-9A0B-574089A94289",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E5C90EE-A9C0-461C-9E89-732BFA9BD066",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
                     matchCriteriaId: "E74B6350-C2F8-4786-8E32-2ED6C188A5E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E26473-A8EF-44C5-B550-5E0B86D31291",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
                     matchCriteriaId: "663FE3CE-FA09-46A2-9C0D-2797D9137A82",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
                     matchCriteriaId: "86309E93-F2C9-4334-9A1C-989EFDC99215",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
                     matchCriteriaId: "65318A70-40FF-4BE8-962B-DFCD5C476166",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "999A0969-60EB-4B2E-A274-9F05D9F840E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED24C763-7558-4AC0-AE10-FDA3D3078D27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "78F98CD7-A352-483C-9968-8FB2627A7CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "07E1B690-C58B-4C08-A757-F3DF451FDAAA",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21CF907-707A-43CA-984C-310062705C63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "46DC4972-7FA1-4320-83E6-607D139121EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "339DDB07-6C16-43B9-A880-77E2351B1C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBCB451E-8945-408C-94F5-36C43AA05C1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7F30211-BB7A-41D3-946F-655C028A3772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE0EAB-F266-437A-B615-69536AF50B49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD50773D-8E63-45C7-A52D-D7B13F65327F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "282793F1-296C-423A-9A2D-301DC3340664",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "020B669B-DE6B-4828-BB44-D99EE576B79D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8C9BCB53-72AA-426F-9D18-544038B65128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CE2412-CFB8-42B0-B39E-84569C922952",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
                     matchCriteriaId: "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3B791566-5B22-452D-ACDA-A1085700AE2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "904FC5E4-6BE0-4B15-8283-26F92922B78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8F47A997-B2A5-459D-8089-12B2AB438FB0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).",
      },
   ],
   id: "CVE-2002-1024",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2002-10-04T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.cisco.com/warp/public/707/SSH-scanning.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.iss.net/security_center/static/9437.php",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/290140",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/5114",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/warp/public/707/SSH-scanning.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.iss.net/security_center/static/9437.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/290140",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/5114",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2006-09-14 00:07
Modified
2025-04-03 01:03
Severity ?
Summary
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
References
cve@mitre.orghttp://secunia.com/advisories/21896Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21902Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1016843
cve@mitre.orghttp://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtmlPatch
cve@mitre.orghttp://www.kb.cert.org/vuls/id/175148US Government Resource
cve@mitre.orghttp://www.osvdb.org/28776
cve@mitre.orghttp://www.phenoelit.de/stuff/CiscoVTP.txt
cve@mitre.orghttp://www.securityfocus.com/archive/1/445896/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/445938/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/19998
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/3600Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/28925
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21896Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21902Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016843
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/175148US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/28776
af854a3a-2127-422b-91ae-364da2661108http://www.phenoelit.de/stuff/CiscoVTP.txt
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/445896/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/445938/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19998
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/3600Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/28925
Impacted products
Vendor Product Version
cisco ios 12.1\(19\)
cisco catos *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4944AFEF-D002-4C86-958A-4EB753399FB5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3424FF-8507-4C7A-8858-EA89931A74DB",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.",
      },
      {
         lang: "es",
         value: "El VLAN Trunking Protocol (VTP) característico en Cisco IOS 12.1(19) y CatOS permite a un atacante remoto provocar una denegación de servicio con el envío de una actualización de VTP con un valor de revisión de 0x7FFFFFFF, el cual se incrementa a 0x80000000 y es interpretado como un número negativo en un contexto de señales.",
      },
   ],
   id: "CVE-2006-4775",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.8,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-09-14T00:07:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/21896",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/21902",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1016843",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/175148",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/28776",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.phenoelit.de/stuff/CiscoVTP.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/19998",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2006/3600",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/21896",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/21902",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1016843",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/175148",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/28776",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.phenoelit.de/stuff/CiscoVTP.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/19998",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.vupen.com/english/advisories/2006/3600",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-399",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-11-06 15:55
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.
Impacted products
Vendor Product Version
cisco catos *
cisco ios *



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3424FF-8507-4C7A-8858-EA89931A74DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5802E2D8-7069-474C-826F-AEE7B50BFE34",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad inespecífica en la implementación en Cisco IOS y CatOS del protocolo VLAN Trunking (VTP), cuando el modo de operación de VTP no es transparente, permite a atacantes remotos producir una denegación de servicio (el dispositivo se recarga o se cuelga) a través de un paquete VTP manipulado.",
      },
   ],
   id: "CVE-2008-4963",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-11-06T15:55:51.713",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://osvdb.org/49601",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32573",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1021143",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/32120",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id?1021144",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://osvdb.org/49601",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32573",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1021143",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/32120",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1021144",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-07-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.
Impacted products
Vendor Product Version
cisco catos 4.5\(11\)
cisco catos 4.5.10
cisco catos 5.5\(4b\)
cisco catos 5.5\(6\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(2\)
cisco catos 6.1.2



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "04E2E594-8B82-476B-96A6-C713FE1FA06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D105C909-39B4-4B35-9D6E-3BC78491759F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7AFDED-7F44-438D-9FFD-270856A41275",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.",
      },
   ],
   id: "CVE-2001-0429",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-07-02T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.ciac.org/ciac/bulletins/l-072.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2604",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ciac.org/ciac/bulletins/l-072.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2604",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2000-04-20 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
Impacted products
Vendor Product Version
cisco catos 5.4\(1\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password.",
      },
   ],
   id: "CVE-2000-0267",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 4.6,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: true,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2000-04-20T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/1288",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/1122",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/1288",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/1122",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2003-05-12 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
Impacted products
Vendor Product Version
cisco catos 7.5\(1\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad desconocida en Cisco Catalyst 7.5 permite a usuarios locales saltarse la autenticación y ganar acceso al modo de activación sin una contraseña.",
      },
   ],
   id: "CVE-2003-0216",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 9.3,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2003-05-12T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/443257",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/443257",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-08-06 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
Impacted products
Vendor Product Version
cisco catos 2.1\(1\)
cisco catos 2.1\(2\)
cisco catos 2.1\(3\)
cisco catos 2.1\(4\)
cisco catos 2.1\(5\)
cisco catos 2.1\(6\)
cisco catos 2.1\(7\)
cisco catos 2.1\(8\)
cisco catos 2.1\(9\)
cisco catos 2.1\(10\)
cisco catos 2.1\(11\)
cisco catos 2.1\(12\)
cisco catos 2.2\(1\)
cisco catos 2.2\(2\)
cisco catos 2.3\(1\)
cisco catos 2.4\(1\)
cisco catos 2.4\(2\)
cisco catos 2.4\(3\)
cisco catos 2.4\(4\)
cisco catos 2.4\(5\)
cisco catos 2.4\(5a\)
cisco catos 3.0\(7\)
cisco catos 3.1\(1\)
cisco catos 3.1\(2\)
cisco catos 3.1\(2a\)
cisco catos 3.2\(1\)
cisco catos 3.2\(1b\)
cisco catos 3.2\(2\)
cisco catos 3.2\(3\)
cisco catos 3.2\(4\)
cisco catos 3.2\(5\)
cisco catos 3.2\(6\)
cisco catos 3.2\(7\)
cisco catos 3.2\(8\)gdr
cisco catos 4.1\(1\)
cisco catos 4.1\(2\)
cisco catos 4.1\(3\)
cisco catos 4.2\(1\)
cisco catos 4.2\(2\)
cisco catos 4.3\(1a\)
cisco catos 4.4\(1\)
cisco catos 4.5\(1\)
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(6a\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 4.5\(10\)
cisco catos 4.5\(11\)
cisco catos 4.5\(12\)
cisco catos 4.5\(12a\)
cisco catos 4.5\(13\)
cisco catos 4.5\(13a\)
cisco catos 4.5\(14\)
cisco catos 5.1\(1\)
cisco catos 5.1\(1\)csx
cisco catos 5.1\(1a\)
cisco catos 5.1\(1a\)csx
cisco catos 5.1\(2a\)
cisco catos 5.1\(2b\)
cisco catos 5.2\(1\)
cisco catos 5.2\(1\)csx
cisco catos 5.2\(2\)
cisco catos 5.2\(2\)csx
cisco catos 5.2\(3\)
cisco catos 5.2\(3\)csx
cisco catos 5.2\(3a\)csx
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.2\(7a\)
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.3\(6a\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(1\)deferred
cisco catos 5.4\(2\)
cisco catos 5.4\(2a\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.4\(4a\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(1a\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(5\)
cisco catos 5.5\(6\)
cisco catos 5.5\(6a\)
cisco catos 5.5\(7\)
cisco catos 5.5\(7a\)
cisco catos 5.5\(8\)
cisco catos 5.5\(8a\)
cisco catos 5.5\(8a\)cv
cisco catos 5.5\(9\)
cisco catos 5.5\(10\)
cisco catos 5.5\(10a\)
cisco catos 5.5\(11\)
cisco catos 5.5\(11a\)
cisco catos 5.5\(12\)
cisco catos 5.5\(12a\)
cisco catos 5.5\(13\)
cisco catos 5.5\(13.5\)
cisco catos 5.5\(13a\)
cisco catos 5.5\(14\)
cisco catos 5.5\(15\)
cisco catos 5.5\(16\)
cisco catos 5.5\(16.2\)
cisco catos 5.5\(17\)
cisco catos 5.5\(18\)
cisco catos 5.5\(19\)
cisco catos 6.1
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(1d\)
cisco catos 6.1\(1e\)
cisco catos 6.1\(2\)
cisco catos 6.1\(2a\)
cisco catos 6.1\(3\)
cisco catos 6.1\(3a\)
cisco catos 6.1\(4\)
cisco catos 6.1\(4b\)
cisco catos 6.2\(1\)
cisco catos 6.2\(1a\)
cisco catos 6.2\(2\)
cisco catos 6.2\(2a\)
cisco catos 6.2\(3\)
cisco catos 6.2\(3a\)
cisco catos 6.3\(1\)
cisco catos 6.3\(1a\)
cisco catos 6.3\(2\)
cisco catos 6.3\(2a\)
cisco catos 6.3\(3\)
cisco catos 6.3\(3\)x
cisco catos 6.3\(3\)x1
cisco catos 6.3\(3a\)
cisco catos 6.3\(4\)
cisco catos 6.3\(4a\)
cisco catos 6.3\(5\)
cisco catos 6.3\(5.10\)
cisco catos 6.3\(6\)
cisco catos 6.3\(7\)
cisco catos 6.3\(8\)
cisco catos 6.3\(8.3\)
cisco catos 6.3\(9\)
cisco catos 6.3\(10\)
cisco catos 6.4\(1\)
cisco catos 6.4\(2\)
cisco catos 6.4\(3\)
cisco catos 6.4\(4a\)
cisco catos 6.4\(5\)
cisco catos 6.4\(6\)
cisco catos 6.4\(7\)
cisco catos 6.4\(8\)
cisco catos 7.1\(1\)
cisco catos 7.1\(1a\)
cisco catos 7.1\(2\)
cisco catos 7.1\(2a\)
cisco catos 7.2\(0.65\)
cisco catos 7.2\(1\)
cisco catos 7.2\(2\)
cisco catos 7.3
cisco catos 7.3\(1\)
cisco catos 7.3\(2\)
cisco catos 7.4
cisco catos 7.4\(0.2\)clr
cisco catos 7.4\(0.63\)
cisco catos 7.4\(1\)
cisco catos 7.4\(2\)
cisco catos 7.4\(3\)
cisco catos 7.5
cisco catos 7.5\(1\)
cisco catos 7.6
cisco catos 7.6\(1\)
cisco catos 7.6\(2\)
cisco catos 7.6\(3\)
cisco catos 7.6\(4\)
cisco catos 7.6\(5\)
cisco catos 8.1
cisco catos 8.1\(2\)
cisco catos 8.1\(3\)
cisco catos 8.2
cisco catos 8.2\(1\)
cisco catos 8.3\(1\)glx
cisco catos 8.3glx
cisco catalyst_2901 *
cisco catalyst_2902 *
cisco catalyst_2926 *
cisco catalyst_2926f *
cisco catalyst_2926gl *
cisco catalyst_2926gs *
cisco catalyst_2926t *
cisco catalyst_2948 *
cisco catalyst_2948-ge-tx *
cisco catalyst_2948g-l3 *
cisco catalyst_2980g *
cisco catalyst_2980g-a *
cisco catalyst_4000 *
cisco catalyst_4500 *
cisco catalyst_4503 *
cisco catalyst_4506 *
cisco catalyst_4507r *
cisco catalyst_4510r *
cisco catalyst_4912g *
cisco catalyst_5000 *
cisco catalyst_6000_ws-svc-nam-1 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-1 3.1\(1a\)
cisco catalyst_6000_ws-svc-nam-2 2.2\(1a\)
cisco catalyst_6000_ws-svc-nam-2 3.1\(1a\)
cisco catalyst_6000_ws-x6380-nam 2.1\(2\)
cisco catalyst_6000_ws-x6380-nam 3.1\(1a\)
cisco catos 4.5\(2\)
cisco catos 4.5\(3\)
cisco catos 4.5\(4\)
cisco catos 4.5\(4b\)
cisco catos 4.5\(5\)
cisco catos 4.5\(6\)
cisco catos 4.5\(7\)
cisco catos 4.5\(8\)
cisco catos 4.5\(9\)
cisco catos 4.5\(10\)
cisco catos 4.5\(11\)
cisco catos 4.5\(12\)
cisco catos 4.5\(13a\)
cisco catos 4.5.10
cisco catos 5.1
cisco catos 5.1\(1\)
cisco catos 5.1\(1a\)
cisco catos 5.1\(2a\)
cisco catos 5.2
cisco catos 5.2\(1\)
cisco catos 5.2\(1a\)
cisco catos 5.2\(2\)
cisco catos 5.2\(3\)
cisco catos 5.2\(4\)
cisco catos 5.2\(5\)
cisco catos 5.2\(6\)
cisco catos 5.2\(7\)
cisco catos 5.3\(1\)csx
cisco catos 5.3\(1a\)csx
cisco catos 5.3\(2\)csx
cisco catos 5.3\(3\)csx
cisco catos 5.3\(4\)csx
cisco catos 5.3\(5\)csx
cisco catos 5.3\(5a\)csx
cisco catos 5.3\(6\)csx
cisco catos 5.4
cisco catos 5.4\(1\)
cisco catos 5.4\(2\)
cisco catos 5.4\(3\)
cisco catos 5.4\(4\)
cisco catos 5.5
cisco catos 5.5\(1\)
cisco catos 5.5\(2\)
cisco catos 5.5\(3\)
cisco catos 5.5\(4\)
cisco catos 5.5\(4a\)
cisco catos 5.5\(4b\)
cisco catos 5.5\(5\)
cisco catos 5.5\(6\)
cisco catos 5.5\(7\)
cisco catos 5.5\(13\)
cisco catos 6.1\(1\)
cisco catos 6.1\(1a\)
cisco catos 6.1\(1b\)
cisco catos 6.1\(1c\)
cisco catos 6.1\(2\)
cisco catos 6.1\(2.13\)
cisco catos 6.1\(3\)
cisco catos 6.2\(0.110\)
cisco catos 6.2\(0.111\)
cisco catos 6.3\(0.7\)pan
cisco catos 6.3\(4\)
cisco catos 6.3\(5\)
cisco catos 7.1
cisco catos 7.1\(2\)
cisco catos 7.5\(1\)
cisco catos 7.6\(1\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "185CC3F3-624B-4372-80EC-D8B4BC00384A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AF9A337F-7318-4163-9B6F-9ED7783CF94C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A66B1FC1-F9EA-403D-A63C-E1D7AC108346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "32B13D84-10A7-44C5-B771-B9F237954B2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EDA1D807-2C93-4C94-9CA2-D4875FB0DFA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "381D0006-EE25-4B36-B9E4-65C41E7EFBAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B68ECE9E-6657-46E4-B427-C321289CF78B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D9658139-AC5C-4D4C-B8E2-055DD70EDFF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "434383D6-7DE3-4A3E-8B9E-4F7F79A66807",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E40FC4F6-200D-4150-9353-CA0CD1FF8F92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(11\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D48351F4-51C7-4BE7-B91A-3E2FAD5A2C85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.1\\(12\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5D12B329-490F-4084-8C12-3EE1394EE6E9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8499827B-94C6-4259-BA90-8A5331AF0CD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "36C122D0-D434-4AD4-BD57-E236BA89B85E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E02B8D53-4193-4163-BF22-5534CC73ABB3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1884794C-360E-4C03-ABAC-EA0007F44ED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F84BC6D0-B18F-4A6F-AF51-6FA4CC83DE88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CA89EF90-0DAA-4D5E-9881-6C3A000A2ACD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E1ED7AAA-6978-4438-B896-F6182882CEC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.4\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D5049D68-0729-40CF-827F-E3F59EE9214A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:2.4\\(5a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D93FEAFC-0D2E-46A9-BFD9-5C636D8AC61C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B604D3F1-98B9-487E-8E45-5BAC514689F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DC7B86FA-85A8-44D2-A12C-85312B765A6B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "36962C89-B7F7-4C47-B9FF-5E23FDBCBB51",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AC554CE9-63AA-4BC9-86F8-F3D5968733CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0077517D-E7E3-4A41-87C7-4DECECC44196",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B44D6DEB-84F8-4DA7-82BE-E5839BA5799C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6E28F17F-12BF-48E3-B552-868F8A36B44A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "56124CD6-9802-4663-AB37-D986CB8023C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D7161615-2958-4F0A-907D-4A300D0C00C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C1104B88-1AA1-4164-B12D-970A6D0F531B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5B3D72-7248-4518-8E3A-463AF552493E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "24F6CF22-D4B8-4857-99F8-7D1329CA33D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:3.2\\(8\\)gdr:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE024D9D-6B5B-4F50-84A3-1C2DACD924EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "92FFF1BF-4252-4183-BF0A-64074379AF09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE4395AE-BAD2-4498-9A16-525CA4944001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "09735A07-0FDD-4235-BCA6-377D5882F114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE58DBF3-2ECB-4B8E-A08A-D76C3ECC09D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8500DBD9-61EC-4C9B-8F1E-ED10CBD2F804",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.3\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "157FBE0B-F0BD-4E94-9C3D-349DD65F8310",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "44EAC49D-3B1F-4264-A1FE-37D55525122D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E3AB1738-A733-4227-B389-650FD7559D7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "851920E3-2DF8-4C74-84E0-E3950D2EA672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFAF3474-E030-4AF5-8BE0-966191D15E16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C8EF024C-80B1-4332-ADDC-992C5F933562",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6323C88E-C966-42FC-957F-EC244744A5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(6a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "21C26AFA-1147-4888-AB70-E751349A29DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AD63DBE5-2149-46FF-B272-2E5A3C382548",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "04E2E594-8B82-476B-96A6-C713FE1FA06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D7837C26-C795-4FAC-A11B-149C41B34A26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(12a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "699AF98D-F7F6-4FDE-9CEB-F63E5BCD8EDF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "73A63535-F3C1-42C8-98EA-355F08AA66F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(14\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5404C55E-F7F4-4C83-87BE-02B93F76DC4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B5397DA-73CF-412B-A797-E6DEEC395FEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "587031FB-E0AF-4BD0-8809-8690D3814F3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B53B40D-E949-4811-A483-207F69BB35D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(2b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6C4E5CD6-16CE-41B0-9203-88F10A43247E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6955CCC-F43D-44D4-8714-0FA766C10C6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(2\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "23C82260-D8F9-48DE-AF84-B9B65BB9E277",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2055E432-9939-48F7-A4BE-1888CC7241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(3\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "E08E971E-5FF1-48F7-8A68-FB1BB80908BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(3a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBA3BD8A-FB4A-47C6-B7AB-802393DCA19C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(7a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A9D16366-422C-4291-A0F1-050AD80E8A7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "46DC4972-7FA1-4320-83E6-607D139121EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "339DDB07-6C16-43B9-A880-77E2351B1C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBCB451E-8945-408C-94F5-36C43AA05C1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7F30211-BB7A-41D3-946F-655C028A3772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(6a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF8D3189-2552-43B0-89E7-DFDB4A152A56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE0EAB-F266-437A-B615-69536AF50B49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\)deferred:*:*:*:*:*:*:*",
                     matchCriteriaId: "528940FF-E621-43B8-B562-D9B51231E1FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FA107149-E36F-4D9E-A0C5-8BAA661F18C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD50773D-8E63-45C7-A52D-D7B13F65327F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8EB2FF0C-B5F1-4FDF-B57B-7A7114E09DFD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F7146FDF-3644-469D-8AA1-6AD19BFB5A06",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "282793F1-296C-423A-9A2D-301DC3340664",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "020B669B-DE6B-4828-BB44-D99EE576B79D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9627888A-F522-4A41-8B14-F0E7096509FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(6a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6443D518-066C-46E4-90EA-94BF860741A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(7a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DB127898-E068-4696-A72D-5EDE1730E320",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1255E56C-2DEB-4B86-97A7-7CF6316A2C21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(8a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2BBFE844-7084-4F81-BC5B-42FED826AD12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(8a\\)cv:*:*:*:*:*:*:*",
                     matchCriteriaId: "61FC0A1A-4A1F-4B38-86BA-3DADDB1D6BAF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "753AC7F2-83B7-4288-926B-73774A126D1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DB1C6B11-4AE9-459B-870A-4845DA43ADC8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(10a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "45C18C9D-89F3-43BD-A3A8-EA8EF5BC6E8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(11\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3F11B940-0EA7-4ABE-AA08-29646083E077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(11a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "ABEF59A8-3DAD-4DAE-80BF-9AED862B734D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(12\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "46B1EA66-327F-4FB9-A316-2C29B52AA33A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(12a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F854B7F7-9EDE-4452-85DC-01686BC58D21",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13.5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "717511D5-C05C-4D78-A76D-62E196E1FA1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BF90D0A9-302D-4C66-B145-1EAC5EEBFC3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(14\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9AD4C82A-CDB7-403E-A6B8-7AFF28D2B341",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(15\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "014BA0A4-F21F-4226-A3F9-50C95C2D1B76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(16\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9524A795-3462-4D7B-AEA2-318EE40743E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(16.2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1DDD57B8-9123-4F59-8449-F7E404C2E081",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(17\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9AB54D04-F672-4009-B9D5-FA111D16996C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(18\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5EDA2CA5-0DC9-4B33-B3FD-67867D6360DE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "926FC1F1-C2D1-439C-9A43-B38399A1C363",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8C9BCB53-72AA-426F-9D18-544038B65128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9CDFB025-A93A-441C-84B6-EBB0902A5559",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1e\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C0F9CA24-9D6E-4408-AB1B-55DA4D63F871",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CB27CF6D-0CCC-43C6-A19D-8BB5EC63AFBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B12A4460-1B54-45D6-BE01-28BD52E1DC45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E88E2AD3-68B4-4473-8393-8E792F2539D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9160267C-8FDB-41BB-96C0-2EAEB75BA102",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DB7870CC-BAB2-4BC7-A35B-6629BD325D0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7A98413C-3659-4959-B4C6-7787D0D15878",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9626715B-2878-41CF-9CCF-84553230EB55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7512F24B-D150-4A31-807A-37B6DCAEAE4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1345465E-2B83-40FE-BC6B-536E0A2260D4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8D5183C6-CBD7-4FA0-A6FA-8B35E87E59BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A614780A-D5B8-4368-9255-770C52EF1A2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1C3669F2-4892-4936-8A7E-59D640CEBEA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "30ADFF58-A65F-42F6-97BD-17E491302AA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B243E03B-3A82-40D5-8B47-AED222CF45DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C5E7DF31-2345-4139-BE3D-94128E14F84E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(3\\)x:*:*:*:*:*:*:*",
                     matchCriteriaId: "B60504C4-09F6-4D5C-AF5E-58446C6FA49B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(3\\)x1:*:*:*:*:*:*:*",
                     matchCriteriaId: "34A4E69C-5E3B-4014-9382-E1FA72C31C8A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(3a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5EEF50D9-DE68-4FD0-94F8-45EF319A0332",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3B791566-5B22-452D-ACDA-A1085700AE2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B1A05FF1-D9AF-4752-9E4A-496DAF78D4B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(5.10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CBD37D98-2F73-4CC8-9FB3-5FCC7AA4EB31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F5F64FB9-F6E5-4A96-89FA-23E0531E7FA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "85342953-6AC3-42C3-B5BD-849FD40675F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "03C856BF-4112-454F-BBE3-AFC195F0BAF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(8.3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4855D79B-7AC5-4E61-A9B1-1A770C1F21B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C68C6298-F045-4573-ACCD-1A82E09D72E1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EFE2BF70-A2B4-44A8-820E-4B95D458307F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "980DC7C0-0200-4C4B-8D14-09EB151B09B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "432A925A-1922-4562-841B-65180917D22D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E444F7F2-5526-45C0-AD38-E8A41023B376",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA3EEAE6-9EDF-4783-A083-D6C81CFF510A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B3EE2A06-BA13-4F28-A00B-057DDA2B2CEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0CE99942-0989-47F9-B5AD-FBF4CE4216B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D798B64D-FE4A-4129-8D5A-7C123F5DFC9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "30F7A129-D4EA-4F66-B6A4-147AAB3E624C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DE867B59-439F-4620-A785-E16F2C6DBC6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DEF0CFFD-7889-4B33-AFCD-E3EA978214D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8F47A997-B2A5-459D-8089-12B2AB438FB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B7EF7E63-17F6-4D92-AAB0-205BC44940DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.2\\(0.65\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "94D3F3AF-C844-4445-88E8-9608653B83C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6A64DE87-64E6-4A2C-A932-D5ADBAE9A09E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FF76E1E2-3EE9-4560-B138-06347ECA3B4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.3\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE322AC8-E45F-4C43-BD6A-2FA883AD33C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.3\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0462C72E-7110-48FC-BC88-FF8A5663C6B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7B5E1E-5698-4F69-AB53-C9F6339758C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4\\(0.2\\)clr:*:*:*:*:*:*:*",
                     matchCriteriaId: "F494A6B7-75D4-4A04-889E-7269098AF23D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4\\(0.63\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E79A55B3-65CD-40D7-9215-BC924C519512",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BBEB96B9-6F4C-4C5D-BF6F-BE65C3A96C9E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7D45D090-EFAA-4D2F-BE05-1726E05B12C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "43A64E8E-A8ED-414F-BC61-846AD5D582B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A01B4160-AC81-4C2D-B34A-C46EC2C610E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "D726FE1E-26C9-41F2-AF59-8F8248449DE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6DED72B-DBB7-4E51-AD6D-75EE407A3817",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BE121926-3978-4220-AC94-30A3E4BC2BFC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "760418C3-E160-4468-A47A-7632245EDD84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "28CA144F-341E-4F88-8D67-103F8619B742",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CCED76E-89CA-46E3-A285-2FB907780A66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8AFA7E37-DB5D-4E4C-B48E-37DF120D5DE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "786657C5-9EA5-45D0-B2F8-01AB599F4954",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "75165FB6-B193-4DC9-A2FF-20F553111A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5EAA2D25-6F7C-4EAD-B2BC-B17B21C62A6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.3\\(1\\)glx:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C0D1A2C-EC6F-4725-B305-42CBA32C1682",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.3glx:*:*:*:*:*:*:*",
                     matchCriteriaId: "A95D74BA-04CC-46AB-9F7A-BFF1CE165778",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "59B7C906-927C-4B8B-9FA2-F93CF4DB6023",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "D46A6C9D-3068-4E06-9FC7-C068C2B92FC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5850AC3C-C2D2-41EF-A4F9-81B8E4B08759",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "88256AC6-6E27-40E6-9714-398DEF763D78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D23DF01-93A7-46AD-8B09-963BCC02EB57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61F8C4A-1B97-4550-A465-3157A51E5D04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A9BEB23-E8F7-40A5-965C-F2A02FB65B58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "36A8A4B8-423D-4366-8F6D-521A7120E0E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B539EED0-16A3-4F4F-8791-F90FDA13520B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8BF525D-E813-4CB9-BE84-0B8283F2FACF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E67B901F-1FF8-4B04-ADBB-66606F20A70B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DC0577E-8CCC-4D3A-8536-61577BFA16D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "105544F7-F57E-4B22-921C-E5EEA82B5CC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C88A18B-2949-4D54-8B78-61418C1DD3E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "50E25997-76B2-46FF-8426-8F40002BEE78",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "23267E55-E098-41F5-9B9A-E1919214B579",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "324DE8A5-FA75-4758-8775-65051504259F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "843C8691-3CB5-4C7E-A6C0-47625387CF33",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3021C2B-3E4B-4E81-9725-F75EA7635EED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "38E8BD58-5E55-4F07-B115-3BE78D7B2AD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A2AF1C7-23EB-4C13-AC71-4FA7E78E8ED7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "0BF0BBC8-04BD-4867-B188-35461E50FF16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "A2C1E3F7-D48E-4AF1-8205-33EB71E09E09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C959C93D-D58C-4AB5-9058-0CF257C68F72",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4FDB5EAC-E41D-4A15-B059-45B4BE4813EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E2DF345D-AD8A-4DE6-8136-6EF7B011E4B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "851920E3-2DF8-4C74-84E0-E3950D2EA672",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFAF3474-E030-4AF5-8BE0-966191D15E16",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C8EF024C-80B1-4332-ADDC-992C5F933562",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5F4D6201-495A-4EEC-876F-09B58C1D700F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFA6741-74AF-42E0-9A8A-D775BA9EA519",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6323C88E-C966-42FC-957F-EC244744A5D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C33774F9-D0E0-4BB7-AE78-9B746C5FA972",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD0EFEE7-3EA4-4639-8B53-F7192E7C18E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1A980A98-77C0-44F6-98C6-7CC4FEEC799C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AD63DBE5-2149-46FF-B272-2E5A3C382548",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "04E2E594-8B82-476B-96A6-C713FE1FA06D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "D7837C26-C795-4FAC-A11B-149C41B34A26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8FB48FD-5678-4BAD-8467-3C703E4950DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "D105C909-39B4-4B35-9D6E-3BC78491759F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9229B19E-B65E-4C23-8F35-7019050E24B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8D8B8722-42A0-4CA6-8946-0D97BBABB30A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "587031FB-E0AF-4BD0-8809-8690D3814F3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE163E0F-3F54-45B2-A101-6CA6FA548D2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "847EC2AD-F05D-47BC-841C-21F5ECF7E79B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9D31AB89-4194-4CE5-AD93-3058E77E7E63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC01832-ADF1-4A74-95FE-0B3DDE3AAFB7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "28CB60F6-622C-41D7-AFA4-A2DCE4D02549",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2055E432-9939-48F7-A4BE-1888CC7241C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E8F15DB3-6BC3-4F15-A164-3D1F2FBA718D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "63E4BD89-21FE-492B-85C3-9BEBDB01F8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CE27E478-63BF-4475-B89A-91CF2D9A6C49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "5754B0FA-30C6-4E12-9D6C-92F38CD3A9CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C21CF907-707A-43CA-984C-310062705C63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "C0AC3C74-262E-4A11-BCE8-58DE522E23AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "21A2D344-D0AD-4E0A-A5F3-C4323813FDD0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "46DC4972-7FA1-4320-83E6-607D139121EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "339DDB07-6C16-43B9-A880-77E2351B1C05",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "EBCB451E-8945-408C-94F5-36C43AA05C1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7D8D9AA-154C-46B2-96B8-AADA610056E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7F30211-BB7A-41D3-946F-655C028A3772",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE0EAB-F266-437A-B615-69536AF50B49",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EE529454-F5E6-4417-A5D7-B1A9BCD2B5C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "85D0F005-80B3-41A2-8B7C-EA256C1634DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD50773D-8E63-45C7-A52D-D7B13F65327F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E8A2EE7-8C86-44F0-899C-FD98E08C6E0D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B70FD634-E2D7-4E42-B140-44C5CB9294E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "364CCF12-AF9E-4661-9ECB-9AE0C00813D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "282793F1-296C-423A-9A2D-301DC3340664",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "020B669B-DE6B-4828-BB44-D99EE576B79D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "4D406F1D-C33D-4BC2-BBA8-740A9E114523",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C762F4B3-4F3D-4EE8-A914-1900AE4AA1C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9627888A-F522-4A41-8B14-F0E7096509FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B4C5BA8E-2A45-4952-AEE4-94CBE8B4B855",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "6EEA4461-2225-4D64-9CF9-68039C8E85C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "7860ADDE-7861-41A6-9DA9-2355FEEC4B60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "33A4D6E9-ADCB-4338-8CA9-A2F374F7CE38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FAF08F95-9CF4-4AF6-BB08-021694C7AB40",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8C9BCB53-72AA-426F-9D18-544038B65128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C95B56F4-CDD1-4102-BB33-C66D3CDAC6C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "AA37670F-3FF4-476E-AA4A-7F98229C6EB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "2BA92A7D-5D0C-42A1-8D0B-C50EA6778DEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "52009F7A-2CD1-49BA-B9A6-C88766DC4D6C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CE2412-CFB8-42B0-B39E-84569C922952",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "1F9D3782-7638-4252-B9A1-B11CECBE0D19",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
                     matchCriteriaId: "236ABC7F-51AE-40A9-9A3F-F32E16A7B74E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "3B791566-5B22-452D-ACDA-A1085700AE2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "FD776AC3-A10E-4B4C-BCB9-1DB1781DDA70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "904FC5E4-6BE0-4B15-8283-26F92922B78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "8F47A997-B2A5-459D-8089-12B2AB438FB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\"",
      },
      {
         lang: "es",
         value: "Cisco CatOS anteriores a 5.5(20) a 8.x anteriores a 8.2(2) y 8.3(3) GLX, usados en conmutadores Catalyst, permiten a atacantes remotos causar una denegación de servicio (caída del sistema y reinicio) enviando paquétes no válidos en lugar de la porción final ACK del apretón de manos (handshake) en tres pasos a los servicios \r\n(1) Telnet, (2) HTTP, o (3) SSH. También conocida como  aka \"ataque de DoS TCP-ACK \".",
      },
   ],
   id: "CVE-2004-0551",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-08-06T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/245190",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/245190",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2004-01-05 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EC58B690-8D30-4A04-82AA-A827F87DEE02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "41491D13-A3F9-464A-A84B-A58320838CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6353A76-2075-4245-94C5-D23BF9C03732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "32583745-9640-4032-B1E1-598ABB4E89A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9CAFC15-178C-4176-9668-D4A04B63E77B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.",
      },
      {
         lang: "es",
         value: "Desbordamiento de búfer en el Módulo de Servicios de Cortafuegos Cisco (FWSM) en dispositivos de la seria Cisco Cayalyst 6500 y 7600 permiten a atacantes remotos causar una denegación de servicio (caída y recarga) mediante una petición HTTP auth para autenticación TACACS+ o RADIUS.",
      },
   ],
   id: "CVE-2003-1001",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2004-01-05T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-10-23 21:47
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
Impacted products
Vendor Product Version
cisco catos 6.1
cisco catos 6.2
cisco catos 6.3
cisco catos 6.4
cisco catos 7.1
cisco catos 7.2
cisco catos 7.3
cisco catos 7.4
cisco catos 7.5
cisco catos 7.6
cisco catos 8.1
cisco catos 8.2
cisco catos 8.3
cisco catos 8.4
cisco catos 8.5
cisco ios 12.1
cisco ios 12.2
cisco ios 12.3ja
cisco ios 12.3jea
cisco ios 12.3jeb
cisco ios 12.3jec
cisco ios 12.4ja



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "06F049B3-FBE6-4951-896E-B8AE2D7BFBAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6D9D9464-757E-4723-A475-838DCB069FBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBAB91B7-D94C-484C-8153-2345FB8991CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "64B40395-B525-4471-8FE1-FB1D7BBD99EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "904FC5E4-6BE0-4B15-8283-26F92922B78E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BCBC242B-1D34-4CAB-A96D-7B30DD83678B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC67FF4D-ED26-44B7-8AB9-26F0BB2946BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A7B5E1E-5698-4F69-AB53-C9F6339758C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "A01B4160-AC81-4C2D-B34A-C46EC2C610E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "D726FE1E-26C9-41F2-AF59-8F8248449DE1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CCED76E-89CA-46E3-A285-2FB907780A66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "75165FB6-B193-4DC9-A2FF-20F553111A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "34A3A284-36A9-4E8C-815D-6E2FE4C158DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "840F1B27-22E4-47C3-A4D9-5E43D5153CAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C58A9E7-C119-4DC5-94E4-1701077330EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
                     matchCriteriaId: "D73E5138-016A-48EC-A367-3D3285AAFED2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
                     matchCriteriaId: "C114F1A6-5DFE-408F-B83A-E8B9D4AF9791",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
                     matchCriteriaId: "9CD5C082-9730-466D-A4A8-E4EEE5F3730D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CF419BD-8474-4F33-9CDD-587E341ABA8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EB2B390-A39F-4082-BBCB-712BDD95886D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.",
      },
      {
         lang: "es",
         value: "Vulnerabilidad no especificada en la implementación Extensible Authentication Protocol (EAP) en Cisco IOS 12.3 y 12.4 sobre Cisco Access Points y 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 y 12.2 sobre Cisco switches (Wired EAP dispositivos), y CatOS 6.x hasta la 8.x sobre Cisco switches permite a atacantes remotos provocar denegación de servicio (recarga de dispositivo) a través de un paquete EAP Response Identity manipulado.",
      },
   ],
   id: "CVE-2007-5651",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.1,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
               version: "2.0",
            },
            exploitabilityScore: 8.6,
            impactScore: 6.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-10-23T21:47:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/27329",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/26139",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id?1018842",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2007/3566",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/27329",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/26139",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1018842",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/3566",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-10-09 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.
Impacted products
Vendor Product Version
cisco ios 11.1
cisco ios 11.2
cisco ios 11.3\(11\)b
cisco ios 12.0\(5.1\)xp
cisco ios 12.0\(19\)
cisco ios 12.1
cisco catos 4.5\(1\)



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B6315D-7BEF-419F-9B93-3CF669E986D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8026B11-6144-467F-8094-F4F73CD37526",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C7C99C7-ABF5-4581-B3CB-A8B2DCD7A5CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*",
                     matchCriteriaId: "AEB89FCC-6602-4B41-9BFA-91B0B48827A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "13BB143D-CE87-4B5B-8B41-F641C160624F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E3AB1738-A733-4227-B389-650FD7559D7B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.",
      },
   ],
   id: "CVE-2001-1071",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-10-09T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/139491",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.osvdb.org/1969",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/archive/1/219257",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/archive/1/219305",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/3412",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/139491",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.osvdb.org/1969",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/archive/1/219257",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/archive/1/219305",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/3412",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2008-06-10 18:32
Modified
2025-04-09 00:30
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
cret@cert.orghttp://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
cret@cert.orghttp://lists.ingate.com/pipermail/productinfo/2008/000021.html
cret@cert.orghttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
cret@cert.orghttp://marc.info/?l=bugtraq&m=127730470825399&w=2
cret@cert.orghttp://marc.info/?l=bugtraq&m=127730470825399&w=2
cret@cert.orghttp://rhn.redhat.com/errata/RHSA-2008-0528.html
cret@cert.orghttp://secunia.com/advisories/30574Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30596Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30612
cret@cert.orghttp://secunia.com/advisories/30615Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30626Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30647Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30648Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30665Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/30802Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31334Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31351Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31467Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/31568Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/32664Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/33003Vendor Advisory
cret@cert.orghttp://secunia.com/advisories/35463
cret@cert.orghttp://security.gentoo.org/glsa/glsa-200808-02.xml
cret@cert.orghttp://securityreason.com/securityalert/3933
cret@cert.orghttp://sourceforge.net/forum/forum.php?forum_id=833770
cret@cert.orghttp://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380
cret@cert.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
cret@cert.orghttp://support.apple.com/kb/HT2163
cret@cert.orghttp://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
cret@cert.orghttp://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtmlVendor Advisory
cret@cert.orghttp://www.debian.org/security/2008/dsa-1663Patch
cret@cert.orghttp://www.kb.cert.org/vuls/id/878044US Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/CTAR-7FBS8QUS Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/MIMG-7ETS5ZUS Government Resource
cret@cert.orghttp://www.kb.cert.org/vuls/id/MIMG-7ETS87US Government Resource
cret@cert.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:118
cret@cert.orghttp://www.ocert.org/advisories/ocert-2008-006.html
cret@cert.orghttp://www.openwall.com/lists/oss-security/2008/06/09/1
cret@cert.orghttp://www.redhat.com/support/errata/RHSA-2008-0529.html
cret@cert.orghttp://www.securityfocus.com/archive/1/493218/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/archive/1/497962/100/0/threaded
cret@cert.orghttp://www.securityfocus.com/bid/29623Exploit, Patch
cret@cert.orghttp://www.securitytracker.com/id?1020218
cret@cert.orghttp://www.ubuntu.com/usn/usn-685-1
cret@cert.orghttp://www.us-cert.gov/cas/techalerts/TA08-162A.htmlUS Government Resource
cret@cert.orghttp://www.vmware.com/security/advisories/VMSA-2008-0013.html
cret@cert.orghttp://www.vmware.com/security/advisories/VMSA-2008-0017.html
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1787/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1788/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1797/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1800/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1801/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1836/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/1981/references
cret@cert.orghttp://www.vupen.com/english/advisories/2008/2361
cret@cert.orghttp://www.vupen.com/english/advisories/2008/2971
cret@cert.orghttp://www.vupen.com/english/advisories/2009/1612
cret@cert.orghttps://bugzilla.redhat.com/show_bug.cgi?id=447974
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785
cret@cert.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414
cret@cert.orghttps://www.exploit-db.com/exploits/5790
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
cret@cert.orghttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.ingate.com/pipermail/productinfo/2008/000021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127730470825399&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127730470825399&w=2
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2008-0528.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30574Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30596Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30612
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30615Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30626Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30647Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30648Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30665Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30802Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31334Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31351Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31467Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31568Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32664Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33003Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35463
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200808-02.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3933
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/forum/forum.php?forum_id=833770
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT2163
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
af854a3a-2127-422b-91ae-364da2661108http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1663Patch
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/878044US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/CTAR-7FBS8QUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/MIMG-7ETS5ZUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/MIMG-7ETS87US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:118
af854a3a-2127-422b-91ae-364da2661108http://www.ocert.org/advisories/ocert-2008-006.html
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/06/09/1
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0529.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/493218/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497962/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/29623Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020218
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-685-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-162A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2008-0013.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2008-0017.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1787/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1788/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1797/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1800/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1801/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1836/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1981/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2361
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2971
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1612
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=447974
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/5790
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
Impacted products
Vendor Product Version
cisco catos 7.1.1
cisco catos 7.3.1
cisco catos 7.4.1
cisco catos 8.3
cisco cisco_ios 12.0
cisco cisco_ios 12.0
cisco cisco_ios 12.1
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.2
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.3
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco cisco_ios 12.4
cisco ios 10.0
cisco ios 11.0
cisco ios 11.1
cisco ios 11.3
cisco ios 12.2
cisco ios_xr 2.0
cisco ios_xr 3.0
cisco ios_xr 3.2
cisco ios_xr 3.3
cisco ios_xr 3.4
cisco ios_xr 3.5
cisco ios_xr 3.6
cisco ios_xr 3.7
cisco nx_os 4.0
cisco nx_os 4.0.1
cisco nx_os 4.0.2
ecos_sourceware ecos 1.1
ecos_sourceware ecos 1.2.1
ecos_sourceware ecos 1.3.1
ecos_sourceware ecos 2.0
ecos_sourceware ecos 2.0
net-snmp net_snmp 5.0
net-snmp net_snmp 5.0.1
net-snmp net_snmp 5.0.2
net-snmp net_snmp 5.0.3
net-snmp net_snmp 5.0.4
net-snmp net_snmp 5.0.5
net-snmp net_snmp 5.0.6
net-snmp net_snmp 5.0.7
net-snmp net_snmp 5.0.8
net-snmp net_snmp 5.0.9
net-snmp net_snmp 5.1
net-snmp net_snmp 5.1.1
net-snmp net_snmp 5.1.2
net-snmp net_snmp 5.2
net-snmp net_snmp 5.3
net-snmp net_snmp 5.3.0.1
net-snmp net_snmp 5.4
sun solaris 10.0
sun sunos 5.10
cisco ace_10_6504_bundle_with_4_gbps_throughput *
cisco ace_10_6509_bundle_with_8_gbps_throughput *
cisco ace_10_service_module *
cisco ace_20_6504_bundle_with__4gbps_throughput *
cisco ace_20_6509_bundle_with_8gbps_throughput *
cisco ace_20_service_module *
cisco ace_4710 *
cisco ace_xml_gateway 5.2
cisco ace_xml_gateway 6.0
cisco mds_9120 *
cisco mds_9124 *
cisco mds_9134 *
cisco mds_9140 *
ingate ingate_firewall 2.2.0
ingate ingate_firewall 2.2.1
ingate ingate_firewall 2.2.2
ingate ingate_firewall 2.3.0
ingate ingate_firewall 2.4.0
ingate ingate_firewall 2.4.1
ingate ingate_firewall 2.5.0
ingate ingate_firewall 2.6.0
ingate ingate_firewall 2.6.1
ingate ingate_firewall 3.0.2
ingate ingate_firewall 3.1.0
ingate ingate_firewall 3.1.1
ingate ingate_firewall 3.1.3
ingate ingate_firewall 3.1.4
ingate ingate_firewall 3.2.0
ingate ingate_firewall 3.2.1
ingate ingate_firewall 3.2.2
ingate ingate_firewall 3.3.1
ingate ingate_firewall 4.1.0
ingate ingate_firewall 4.1.3
ingate ingate_firewall 4.2.1
ingate ingate_firewall 4.2.2
ingate ingate_firewall 4.2.3
ingate ingate_firewall 4.3.1
ingate ingate_firewall 4.4.1
ingate ingate_firewall 4.4.2
ingate ingate_firewall 4.5.1
ingate ingate_firewall 4.5.2
ingate ingate_firewall 4.6.0
ingate ingate_firewall 4.6.1
ingate ingate_firewall 4.6.2
ingate ingate_siparator 2.2.0
ingate ingate_siparator 2.2.1
ingate ingate_siparator 2.2.2
ingate ingate_siparator 2.3.0
ingate ingate_siparator 2.4.0
ingate ingate_siparator 2.4.1
ingate ingate_siparator 2.5.0
ingate ingate_siparator 2.6.0
ingate ingate_siparator 2.6.1
ingate ingate_siparator 3.0.2
ingate ingate_siparator 3.1.0
ingate ingate_siparator 3.1.1
ingate ingate_siparator 3.1.3
ingate ingate_siparator 3.1.4
ingate ingate_siparator 3.2.0
ingate ingate_siparator 3.2.1
ingate ingate_siparator 3.2.2
ingate ingate_siparator 3.3.1
ingate ingate_siparator 4.1.0
ingate ingate_siparator 4.1.3
ingate ingate_siparator 4.2.1
ingate ingate_siparator 4.2.2
ingate ingate_siparator 4.2.3
ingate ingate_siparator 4.3.1
ingate ingate_siparator 4.3.4
ingate ingate_siparator 4.4.1
ingate ingate_siparator 4.4.2
ingate ingate_siparator 4.5.1
ingate ingate_siparator 4.5.2
ingate ingate_siparator 4.6.0
ingate ingate_siparator 4.6.1
ingate ingate_siparator 4.6.2
juniper session_and_resource_control 1.0
juniper session_and_resource_control 2.0
juniper src_pe 1.0
juniper src_pe 2.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE64E4C4-BACE-404F-966D-415976781DC4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "377F951F-C2D8-441D-A532-F62E23937F94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "34A3A284-36A9-4E8C-815D-6E2FE4C158DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
                     matchCriteriaId: "A5823F33-7FB3-465B-8017-1866D9EF3AA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
                     matchCriteriaId: "94870E9E-C883-4051-8854-CDE0AE7A64B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
                     matchCriteriaId: "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
                     matchCriteriaId: "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*",
                     matchCriteriaId: "EB593071-BB5A-47AD-B9C6-59D2010F6280",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
                     matchCriteriaId: "74382B2D-E9A6-453D-9C07-F959EAB4C075",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
                     matchCriteriaId: "B3D93383-BD5A-4052-B724-055F6FCFC314",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
                     matchCriteriaId: "6B1E3C39-163D-4A99-AC96-2EE388305000",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
                     matchCriteriaId: "90710000-F963-4F36-9EE1-C3CE1CECDCA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
                     matchCriteriaId: "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*",
                     matchCriteriaId: "6E2D6402-D2AF-4817-8A46-1FA9B17B720C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
                     matchCriteriaId: "79BB5494-735D-424B-8B41-2FAECE1A7AD4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
                     matchCriteriaId: "FD6178BC-9741-4FC1-87DA-A5407B3A4F40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*",
                     matchCriteriaId: "2A419BD7-6345-43D8-B69C-2255E2EF6FD7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
                     matchCriteriaId: "B472DEEE-148A-46B4-BCBC-0A9F62F38B31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
                     matchCriteriaId: "23305EBA-11D5-417E-823E-39D0D052839D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
                     matchCriteriaId: "95418AD2-FB85-4E20-B874-D82DDF88BC91",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
                     matchCriteriaId: "14D1B81D-95E4-4945-94F2-C36FD7C0DC55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
                     matchCriteriaId: "452FF154-F6C0-4BC4-969E-1D49AA3CCE49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
                     matchCriteriaId: "3AB6C57C-8805-443F-8ACE-83DAA48878CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
                     matchCriteriaId: "554C9611-55F1-40AF-9862-7E902D5CE1D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
                     matchCriteriaId: "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
                     matchCriteriaId: "EEB0B55E-3579-4929-862F-C5FF9F796AE1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
                     matchCriteriaId: "8E8E34D3-0BCB-4D19-A41C-0375941E1B21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
                     matchCriteriaId: "09CBD68E-2A5C-43DF-9AD6-DE07815821B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
                     matchCriteriaId: "01393D91-ED1D-460D-8621-10260F0CBDD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
                     matchCriteriaId: "8AB2FF53-5991-4264-B5CC-D1E45460BFCE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
                     matchCriteriaId: "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
                     matchCriteriaId: "1BE94EA2-E0CC-4760-94A8-DE56C8181F74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
                     matchCriteriaId: "929836AD-8128-4174-872D-B9638B54611C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
                     matchCriteriaId: "5ED5B53D-930D-477E-A0F6-76167AE67641",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
                     matchCriteriaId: "84983F6A-64F6-4720-9291-FC84CA10EE25",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6A60117-E4D1-4741-98A2-E643A26616A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
                     matchCriteriaId: "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
                     matchCriteriaId: "C9E90E83-1732-4BEF-BC5B-401769DC8880",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
                     matchCriteriaId: "51679B26-DF28-4E41-9801-E1599F250FFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
                     matchCriteriaId: "E989900F-BE66-47E4-9A1B-11B9785F89BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
                     matchCriteriaId: "95A01B7E-8231-4001-A340-31CE66474FDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
                     matchCriteriaId: "3CC62D3B-A287-4DED-A44D-3351452D4A55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
                     matchCriteriaId: "687E91FF-957E-449F-BDD6-85AA59E1E0D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "79528F96-FD42-4A76-82EE-4B1324D53B5F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D626B494-6210-4F74-8D17-BA480B6665C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "82B6315D-7BEF-419F-9B93-3CF669E986D1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "904CA41E-8168-41DE-AE84-941962A7BB71",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D69F8FA-D58A-4F53-86D8-A20C73E9B299",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD331C50-DB93-4001-B56A-C1012F894CDF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "75538529-611A-43B5-AC4D-089C4E2E2ACC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F992D03D-1DB8-44C1-B59D-1C09A32A2C91",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2FE436B-2117-4FB4-B550-8454848D1D58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "69D2BD63-C110-4E89-B239-4A59E20AB78E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*",
                     matchCriteriaId: "43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BD3BD3D-767D-483D-9FFE-D23AA2E228E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6762126F-55E4-4963-99F5-206A46979E7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1945B97A-8276-4EE2-8F76-5F0C0956DF18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2452913-0513-46BB-A52E-8FA12D77B570",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*",
                     matchCriteriaId: "5D967624-23B1-48BB-91DB-1E1C18AAAD85",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "77930529-89BE-463D-8259-3D67D153284A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "743DEB17-3BE3-4278-A54B-2CE547DB9F31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2BCA127-F5F3-418F-890D-6B1C03019590",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA5A2C2F-ABF4-46B0-80AB-867B97AE5237",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE83150C-456E-462A-A0F1-ED8EAD60D671",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF5B2431-335C-461B-B07F-88267EA71DCD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DBA8E67-021A-4D07-94B9-943A8E1C4468",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "905D1F04-CDFD-4BAD-8939-5ABC70A874E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "00878E69-2721-43E3-A853-D3DCFE5C258D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C51799BB-D931-436C-8C94-558956AC880A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D498D406-A453-4119-BBA1-4709CF5862AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D68555E-BEB9-4F1E-8D6D-C313FB501523",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B44A0D4-3020-414B-81D7-679E8441E182",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*",
                     matchCriteriaId: "B76A8BD4-E53F-49A6-946B-6E672DD0419C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C6B46B-13E2-4DA4-9EF2-007893034269",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1C501EB-CF9F-437D-A7C0-2A12F1D5E171",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "15D3471D-6267-4481-8BBD-BFC106E8F30B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0292228-80D8-4BA4-8662-698D7003D7D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBFD21CF-CC38-477F-A78B-10CFEFF81E0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "522C9080-86A6-40A8-905C-73187DAF83F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C1B7A18-F230-44D4-801E-8284085CA1DF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E62CC4C-89A7-4594-BDD8-394211889220",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E152F995-BCD2-4725-A47C-1A5E7D6B9005",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "51E38404-ED69-4B0E-A035-2AF5E0649CC1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "A90F0A06-A634-4BD0-A477-90BD3384B7D0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0123D2ED-3983-45D3-B54A-3E75FCE99C6D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E50E974E-87F5-45A2-88BA-B1E4913E3DAD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4AB25CC-BB96-4675-98D7-C5FF30C24014",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C7C95AD-3D5F-458B-A761-5D7779FEA327",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E4A3F6-5D89-47D0-84AD-601682399D8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C700A36D-5FB4-475D-BE85-74511830870A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "02060365-1D67-4611-8D79-B9FC354EBF99",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "194BD880-F672-4492-8356-B14C8DA8C2DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1D769FC-3081-48F8-BBF1-3964F3F8B569",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A966DB26-8A52-4F4D-9C0E-8A8719A195AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6675DF0-963A-4091-9786-7CE3337EE47E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "77A94931-8584-4021-A5BB-83FF22D54955",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F06FB120-9BB3-4363-B2A2-A3475993FDFD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8229DE3A-B9CB-44FF-8409-51E09DDED479",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2699E7A6-7B3A-4C4C-9472-B8B6B547624D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D913348F-351C-4D78-A0AA-27B355D52235",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3E88A46-CEC7-46D5-9697-232E18531FD5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ECFBAFE-9267-469A-A97F-F716969B247C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "48F839C7-7B33-4BF6-9ACF-76F32F5D7C72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "AE1559E6-E7B6-4B5B-8841-CF502E05BA46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F041246F-5B7F-4F63-9E81-02465C9062C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB78013-DEE9-438E-ABD1-5E3D932177BB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D77447C3-AA72-4CAB-A0B1-0883D41AD064",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9C3F04F-7581-4DCA-970D-9FCBB56EA724",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ABF04A7-8230-4AB9-8D66-DF1463037823",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC205E36-7027-4A9B-8574-9BB9C68007A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "69C55DD7-986A-4AB6-8F61-5A5D26531011",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "84DDD7E4-D5D7-4341-9482-2B918306578D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "14A3C59C-6A3D-477B-B425-1C085D6951E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "31AA57F4-5023-4333-9F19-C9D362E8E495",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "063034FF-0AB8-4D78-9822-0DCA9657C853",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "67477EC7-363E-45B5-BA53-1A4E9FB20CDE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "78E11F95-E635-465C-BD7F-5F7E9192DEAC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "74F145F0-573E-4CBC-AB69-3B77D6F9A540",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "49DA7D86-8845-43CA-80DC-3D794322CB28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABD34FEB-7956-44AE-A510-2E5F9EF61651",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DEF5098-3791-4CEB-A436-2809A4385D27",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D895880-FB98-4472-A164-458CE086F339",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7912AA3-0469-479E-9C5A-53F20E504956",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8677C6C8-39CA-492A-A196-9DFAF892120C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "60E46CAD-0032-4CD6-AA2A-871E1DFC3A35",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "22CE55DE-00CA-4F87-9CA0-80A360E332FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "63DC81FA-A6B4-41DC-8097-8944D06A2451",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB87853E-CAFF-48D8-9C56-A2DE325235D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "61E35451-BEE3-412A-8706-5522C00BE1DD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F45326B3-CC4E-4C3A-9819-28936A0432F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDBF1A78-7190-4326-84BD-C18CC354DA38",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97FFBA0-2E80-40EF-A4AC-F26D3490371E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A442F5B-5A1A-4CD0-B693-851FFB917E5D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "074BCB70-AD66-4141-9DD3-9DE73BDCB0F3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "646BF70F-CB7B-48E3-8563-E089E1CECD11",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CD34A7B-508C-45F2-8725-FE42398D3652",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2785732-A5C7-434E-B45D-13138B574F45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "989A4E8A-F23D-4BF5-B860-FB7B04A1CE56",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A07E1241-24BE-48D3-B737-56B2AAA3AF64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFB751FD-CCCA-4131-A24F-65DEF1128B26",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D106F4E4-4B41-4002-8C34-6A9C3A0FF640",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "863583DC-DD93-46DC-BA06-0B838CDB2565",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
      },
      {
         lang: "es",
         value: "Una comprobación SNMPv3 HMAC en (1) Net-SNMP versión 5.2.x anterior a  5.2.4.1,  versión  5.3.x anterior a  5.3.2.1 y  versión 5.4.x anterior a  5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series  versión 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (también se conoce como Network Appliance) ONTAP  versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versión anterior a 16.2; (7) múltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall  versión  3.1.0 y posterior y SIParator  versión  3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent  versión 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticación SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte.",
      },
   ],
   id: "CVE-2008-0960",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2008-06-10T18:32:00.000",
   references: [
      {
         source: "cret@cert.org",
         url: "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html",
      },
      {
         source: "cret@cert.org",
         url: "http://lists.ingate.com/pipermail/productinfo/2008/000021.html",
      },
      {
         source: "cret@cert.org",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html",
      },
      {
         source: "cret@cert.org",
         url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
      },
      {
         source: "cret@cert.org",
         url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
      },
      {
         source: "cret@cert.org",
         url: "http://rhn.redhat.com/errata/RHSA-2008-0528.html",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30574",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30596",
      },
      {
         source: "cret@cert.org",
         url: "http://secunia.com/advisories/30612",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30615",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30626",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30647",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30648",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30665",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30802",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31334",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31351",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31467",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31568",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32664",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/33003",
      },
      {
         source: "cret@cert.org",
         url: "http://secunia.com/advisories/35463",
      },
      {
         source: "cret@cert.org",
         url: "http://security.gentoo.org/glsa/glsa-200808-02.xml",
      },
      {
         source: "cret@cert.org",
         url: "http://securityreason.com/securityalert/3933",
      },
      {
         source: "cret@cert.org",
         url: "http://sourceforge.net/forum/forum.php?forum_id=833770",
      },
      {
         source: "cret@cert.org",
         url: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
      },
      {
         source: "cret@cert.org",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1",
      },
      {
         source: "cret@cert.org",
         url: "http://support.apple.com/kb/HT2163",
      },
      {
         source: "cret@cert.org",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Patch",
         ],
         url: "http://www.debian.org/security/2008/dsa-1663",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/878044",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
      },
      {
         source: "cret@cert.org",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118",
      },
      {
         source: "cret@cert.org",
         url: "http://www.ocert.org/advisories/ocert-2008-006.html",
      },
      {
         source: "cret@cert.org",
         url: "http://www.openwall.com/lists/oss-security/2008/06/09/1",
      },
      {
         source: "cret@cert.org",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0529.html",
      },
      {
         source: "cret@cert.org",
         url: "http://www.securityfocus.com/archive/1/493218/100/0/threaded",
      },
      {
         source: "cret@cert.org",
         url: "http://www.securityfocus.com/archive/1/497962/100/0/threaded",
      },
      {
         source: "cret@cert.org",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/29623",
      },
      {
         source: "cret@cert.org",
         url: "http://www.securitytracker.com/id?1020218",
      },
      {
         source: "cret@cert.org",
         url: "http://www.ubuntu.com/usn/usn-685-1",
      },
      {
         source: "cret@cert.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA08-162A.html",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1787/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1788/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1797/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1800/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1801/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1836/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/1981/references",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/2361",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2008/2971",
      },
      {
         source: "cret@cert.org",
         url: "http://www.vupen.com/english/advisories/2009/1612",
      },
      {
         source: "cret@cert.org",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
      },
      {
         source: "cret@cert.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820",
      },
      {
         source: "cret@cert.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785",
      },
      {
         source: "cret@cert.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414",
      },
      {
         source: "cret@cert.org",
         url: "https://www.exploit-db.com/exploits/5790",
      },
      {
         source: "cret@cert.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html",
      },
      {
         source: "cret@cert.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html",
      },
      {
         source: "cret@cert.org",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.ingate.com/pipermail/productinfo/2008/000021.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://rhn.redhat.com/errata/RHSA-2008-0528.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30574",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30596",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/30612",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30615",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30626",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30647",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30648",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30665",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/30802",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31334",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31351",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31467",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/31568",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/32664",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/33003",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/35463",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://security.gentoo.org/glsa/glsa-200808-02.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securityreason.com/securityalert/3933",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sourceforge.net/forum/forum.php?forum_id=833770",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.apple.com/kb/HT2163",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.debian.org/security/2008/dsa-1663",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/878044",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ocert.org/advisories/ocert-2008-006.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.openwall.com/lists/oss-security/2008/06/09/1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2008-0529.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/493218/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/497962/100/0/threaded",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
         ],
         url: "http://www.securityfocus.com/bid/29623",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1020218",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.ubuntu.com/usn/usn-685-1",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.us-cert.gov/cas/techalerts/TA08-162A.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1787/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1788/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1797/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1800/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1801/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1836/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/1981/references",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/2361",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2008/2971",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2009/1612",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.exploit-db.com/exploits/5790",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html",
      },
   ],
   sourceIdentifier: "cret@cert.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-287",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2007-09-27 19:17
Modified
2025-04-09 00:30
Severity ?
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "99DE48DF-A309-4A1C-B977-AE81B4EDB589",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "EC58B690-8D30-4A04-82AA-A827F87DEE02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6BED8BD-79D2-4DD9-A895-66A8C9349F62",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "41491D13-A3F9-464A-A84B-A58320838CBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "9E0747C3-2712-4FA9-92E3-260B3CF080DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "CFF4CBFF-56C4-4411-9F12-2506C3DD563E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "DD4D3F34-A1B3-4469-BF21-666FDAE9198B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8D63186-5834-448C-98F2-0C189A11D25D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
                     matchCriteriaId: "5367C3D5-583A-4942-828F-DD9C8790C93A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
                     matchCriteriaId: "6D4F49E8-9C23-422C-9913-9C11E7F9BF9B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "B64454B8-75A5-4A63-A4DC-ECA17CFBCD7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "E6353A76-2075-4245-94C5-D23BF9C03732",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "19A1FA93-21B3-4CD4-8A62-C66D82CFB2D5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "97742EE8-200E-4A6F-BB81-C2344EF44BD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "BFA58891-105C-4E1F-9B9F-540F5DC0442E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "32583745-9640-4032-B1E1-598ABB4E89A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "F1D952CE-9CDE-442D-8544-4614DBE5AC12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "567897E0-416B-47D8-ABAF-412DA5FF9509",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                     matchCriteriaId: "C6E0B307-56E1-4E0E-A68E-5D95CBC91A8D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.",
      },
      {
         lang: "es",
         value: "Las series de dispositivos Cisco Catalyst 6500 y Cisco 7600 utilizan direcciones IP 127/8 para el Canal Ethernet Fuera de Banda (EOBC, Ethernet Out-of-Band Channel), lo cual permite a atacantes remotos enviar paquetes a una interfaz para la cual la exposición de la red no era intencionada.",
      },
   ],
   id: "CVE-2007-5134",
   lastModified: "2025-04-09T00:30:58.490",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2007-09-27T19:17:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://seclists.org/fulldisclosure/2007/Sep/0573.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/26988",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1018742",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/25822",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securitytracker.com/id?1018743",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2007/3276",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://seclists.org/fulldisclosure/2007/Sep/0573.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/26988",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1018742",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
         ],
         url: "http://www.securityfocus.com/bid/25822",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securitytracker.com/id?1018743",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2007/3276",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

var-200810-0010
Vulnerability from variot

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. Part of the Transmission Control Protocol (TCP) specification (RFC 1122) allows a receiver to advertise a zero byte window, instructing the sender to maintain the connection but not send additional TCP payload data. The sender should then probe the receiver to check if the receiver is ready to accept data. Narrow interpretation of this part of the specification can create a denial-of-service vulnerability. By advertising a zero receive window and acknowledging probes, a malicious receiver can cause a sender to consume resources (TCP state, buffers, and application memory), preventing the targeted service or system from handling legitimate connections. Transmission Control Protocol (TCP) Multiple implementations of service disruption (DoS) Vulnerabilities exist. RFC793 It is prescribed by Transmission Control Protocol (TCP) Implementation of service disruption due to misuse of available resources after connection establishment (DoS) Vulnerabilities exist.Service operation disrupted by a remote third party (DoS) There is a possibility of being attacked. The core TCP/IP protocol is prone to multiple remote denial-of-service vulnerabilities. The issues are tracked by Cisco Bug IDs CSCsv04836, CSCsv07712, CSCsv66169, CSCsv02768, CSCsv08325, and CSCsv08579. These issues are reported to affect multiple vendors' implementations of the TCP/IP stack. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: Windows 2000 TCP/IP Window Size Denial of Service Vulnerabilities

SECUNIA ADVISORY ID: SA36597

VERIFY ADVISORY: http://secunia.com/advisories/36597/

DESCRIPTION: Two vulnerabilities have been reported in Microsoft Windows 2000, which can be exploited by malicious people to cause a DoS (Denial of Service).

1) An error in the TCP/IP processing can be exploited to cause a system to stop responding to new requests by flooding it using specially crafted packets with a TCP receive window size set to a very small value or zero.

2) An error in the TCP/IP processing can be exploited to cause connections to hang indefinitely in a FIN-WAIT-1 or FIN-WAIT-2 state. This can be exploited to cause a system to stop responding to new requests by flooding it using specially crafted packets with a TCP receive window size set to a very small value or zero.

SOLUTION: According to the vendor, no patches will be made available as it would require re-architecting a significant amount of the OS.

PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Jack C. Louis, Outpost24. 2) The vendor credits Felix Lindner, Recurity Labs.

ORIGINAL ADVISORY: MS09-048 (KB967723): http://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c01923093 Version: 1

HPSBMI02473 SSRT080138 rev.1 - Cisco Catalyst Blade Switch 3020/3120, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2009-11-17 Last Updated: 2009-11-17

Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS)

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY A potential vulnerability has been identified with the Cisco Catalyst Blade Switch 3020/3021. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

References: CVE-2008-4609, Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products(cisco-sa-20090908-tcp24)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Cisco Catalyst Blade Switch 3020 for c-Class BladeSystem running firmware earlier than v12.2(50) Cisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP running firmware earlier than v12.2(50)

BACKGROUND

CVSS 2.0 Base Metrics

Reference Base Vector Base Score CVE-2008-4609 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002

RESOLUTION

HP has provided firmware updates to resolve this vulnerability.

Product Firmware Version

Cisco Catalyst Blade Switch 3020 for c-Class BladeSystem 12.2(50) SE1 or subsequent

Cisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP 12.2(50) SE1 or subsequent

To Locate the Firmware Update

Browse to http://www.hp.com and do the following:

Select "Support & Drivers" In Step 1 select "Download drivers and software (and firmware)" In Step 2 enter "Cisco Catalyst Blade Switch" Click on "Go" Select the desired product Select the desired Windows operating system Click on "Firmware - Blade Infrastructure"

PRODUCT SPECIFIC INFORMATION None

HISTORY Version:1 (rev.1) - 17 November 2009 Initial release

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

Support: For further information, contact normal HP Services support channel.

Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.

To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.

To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do

  • The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:

GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault

System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.

"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."

Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAksEDAMACgkQ4B86/C0qfVm87gCgliWdpIKldzOKHRvJA5r9gR4Z ge0AoMu3ueCbIB4y3HUmT/jReUzE4jym =uBei -----END PGP SIGNATURE-----

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200810-0010",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios",
            scope: "eq",
            trust: 2.1,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 2.1,
            vendor: "cisco",
            version: "12.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 2.1,
            vendor: "cisco",
            version: "12.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 2.1,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 2.1,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1.8,
            vendor: "oracle",
            version: "10",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1.8,
            vendor: "oracle",
            version: "8",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1.8,
            vendor: "oracle",
            version: "9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(9\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(5\\)wc2b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.2xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.1xx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.1xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.4xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.3xx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.0xv",
         },
         {
            model: "catos 8.4 glx",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xe",
            scope: "eq",
            trust: 1.1,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "rtx1100",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "ios xe",
            scope: "eq",
            trust: 1.1,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "pix/asa",
            scope: "eq",
            trust: 1.1,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "rtx1500",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rtx2000",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt57i",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "pix/asa",
            scope: "eq",
            trust: 1.1,
            vendor: "cisco",
            version: "8.0",
         },
         {
            model: "rtv700",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt300i",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "pix/asa",
            scope: "eq",
            trust: 1.1,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "pix/asa",
            scope: "eq",
            trust: 1.1,
            vendor: "cisco",
            version: "7.2",
         },
         {
            model: "rtx1000",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt250i",
            scope: null,
            trust: 1.1,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(23\\)e4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yh3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10.5\\)ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(24a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)ja1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.52",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1d\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xy",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.19",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7a\\)ey3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(15\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)e3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ea2b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xh",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.45",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.34",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.8.1.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)sx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0wt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxd4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)ys",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)ewa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.44",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(9\\)p",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2\\)xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2f",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(16\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)t8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5c\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5.3\\)wc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2f",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.27",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(17\\)ct",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3xa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.39",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.12",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)yb",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.4.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)t4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1gb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(1c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e20",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)so4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xm",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.18",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3jec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)t3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xf",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)xz7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)ya2",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1cx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sxd",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.4.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)eb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(28c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bc1f",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)xy4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.21",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(6.8\\)t1a",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.4",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "2.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3\\)t2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.37",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)ja1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6.5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)t1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(11d\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)t14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(15a\\)p",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13e\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.21.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(1\\)ed",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17a\\)",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "3.0.1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "4.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(7a\\)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)eo",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(1b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(4\\)f1",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19.3\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1t",
         },
         {
            model: "windows 2000",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.34",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.42",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(17\\)bt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xd",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)e14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)sx",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.61",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(15\\)aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ja1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ze",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)ja",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.46",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)s5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(11b\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xi1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxd5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "9.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(7\\)ca",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ex",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.36",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3ya",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.46",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)ja",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3a\\)t4",
         },
         {
            model: "dragonflybsd",
            scope: "eq",
            trust: 1,
            vendor: "dragonflybsd",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.22",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(2\\)e1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(19a\\)gs6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7\\)da2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)ys_1.2\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(16\\)aa",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "4.0.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.48",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3a\\)e7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13.4\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yf2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ys",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8\\)ea2b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)e1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)xm1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zh8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.31",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)xy5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bc2h",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.25",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)ea4a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(24\\)s5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(11\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)sc3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.27",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)t8",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(17\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)ja1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.23",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.0.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yf4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4ja",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)mx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xb14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1da",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.24",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xf",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.6.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1a\\)t1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(12b\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2wa4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yf4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc5a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1b\\)da1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xk2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xc1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.5",
         },
         {
            model: "trustedbsd",
            scope: "eq",
            trust: 1,
            vendor: "trustedbsd",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.35",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)s2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "1.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(19\\)b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ez1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sx1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)xe1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)tpc11a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xk1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.42",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(10.5\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12\\)da3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yz",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2t",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.6.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12\\)da8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ev",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.22",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.66",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11\\)ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxd1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)tpc10a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ea1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(25\\)w5\\(27\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1eb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xi2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(8\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2cy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xu",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.24",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)ea",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3.2\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "1.3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(10e\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xk2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)s9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zo",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)sl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(2\\)xf",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.13",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "3.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(24\\)s6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28\\)s5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)e1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.99",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.16",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.48",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11.5\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yq",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(27b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(13a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)bc3c",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17d\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2cz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(3.4\\)bp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)s1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.9.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14\\)s7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(8\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)dx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)t9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zo",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(13\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.56",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)s3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3db",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12c\\)ew4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1dc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)s3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.49",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yd6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(11b\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)ex3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)sl",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.34.1",
         },
         {
            model: "bsd",
            scope: "eq",
            trust: 1,
            vendor: "bsd",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yt1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sxe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)st6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(8a\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.39",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.41",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xa1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(24.2\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3jeb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2\\)xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)ew3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ye",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5a\\)b2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)mc2e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xm2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)s2a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(26\\)sv1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)e3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2bc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(6a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)seb3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3tpc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yi1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)eb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.20",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)jk",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)yp1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0w5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)ze",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ea1a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14a\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.20",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(20\\)aa4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12\\)da9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2fx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yb4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yg3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(12\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9a\\)bc6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.20",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.48",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.17",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)s8a",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ez",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(3b\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4sw",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.33.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28\\)s3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)dc2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ya",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)ewa2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3bw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(6\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)w5\\(21\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(25\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7a\\)ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)t8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ez2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)ja1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(25.4\\)s1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(15b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ey3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xk3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3jx",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xs",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0ev",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xw",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)seb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)se3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)s10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1sec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sea",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xv4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sy",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxe3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)ew3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xc4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8a\\)ew",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(36\\)cc4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17a\\)sxa",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.7.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.50",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.5.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xc3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2jk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(21\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)eu2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)s",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)mx1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ez1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)ys1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(2b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(13\\)aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28\\)w5-32a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(2\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)",
         },
         {
            model: "bsd",
            scope: "eq",
            trust: 1,
            vendor: "bsd",
            version: "4.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xd",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.13.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.40",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)xp",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yu",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.24",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "1.1.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.31",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xe2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(12\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)mc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2by",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t17",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(4\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8.9\\)sa6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.30",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2\\)xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5c\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.49",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)e4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(3h\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e17",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18b\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(7\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yd",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)sp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(8\\)t1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "7.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)t9",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.62",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(12\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)xr",
         },
         {
            model: "bsd",
            scope: "eq",
            trust: 1,
            vendor: "bsd",
            version: "4.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(11\\)st4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)xr4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xl4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xm4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(4\\)xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)b4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)fy",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.1",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "4.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)st5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yn",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xh",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.28",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)w5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)ea1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)ew3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4t",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)jx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)t10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20.4\\)sp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yh",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(16f\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xk4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)eu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(5\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.1.132",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9d\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)b3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(22a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yq4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)bx",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.36",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8\\)sa5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8\\)sa1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)sp1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)t4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.22",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9a\\)bc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)s",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)ea1e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yu1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)db1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "3.99.15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1ia",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1eo",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.35",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)db2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)yw3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yi3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.25",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(27\\)sv",
         },
         {
            model: "catalyst blade switch 3120x",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(50\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zh3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(22\\)ea6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sx",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "7.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)ea1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yb",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0dc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yb",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.21",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(23\\)e1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17\\)a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)yz2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2mc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)mb3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ew",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.21",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "0.4_1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(6\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.51",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)b",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "6.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1az",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)ex4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)w",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8a\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ym",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1cc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.65",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(6c\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ewa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2mx",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(26\\)e3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)yw2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(11c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12i\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)cx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4mr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(10\\)da2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16.06\\)s",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8\\)aa1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(27\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(23\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)t1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)s8",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)za8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xi",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.33",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(7\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(7.4\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9\\)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "1.2.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(11\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2\\)xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3na",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e18",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(8\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(16\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)ea3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ea",
         },
         {
            model: "windows vista",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(36\\)ca2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xu1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(17\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15\\)s3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)e12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yg2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12.05\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13.03\\)b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.19",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)zb7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(17\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ya",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3j",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sec1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11a\\)",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "4.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.13.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28d\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.49",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)by2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "9.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yc1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.30",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.34.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.39",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(28a\\)ia",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)fc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xg5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ew",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xg5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(9\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.19",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)xy6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ew1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zl1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(5b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ea2c",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.26",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ay",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ey2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(13\\)s8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)dc2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(9\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)s8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.68",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)xb2",
         },
         {
            model: "catalyst blade switch 3020",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(50\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(24c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sw4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3bc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.24",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xv5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.29",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)db1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.19.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xv3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xd3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(13b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)t16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3ma",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2tpc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.53",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)st2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.43",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12c\\)ec",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.45",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.32",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2dd",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.6.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ca",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.13",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)s7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5a\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(3d\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(24b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0t",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)jk5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)se",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(26\\)p5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(26\\)e1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.26",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(05\\)wc8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xd2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.33",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xg",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)ec1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2bz",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3ye",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sw3a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(13\\)w5\\(19c\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(7a\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.51",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)za2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5\\)b1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3a\\)e8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)mr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xu2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(4\\)f",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xh2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xd1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(27\\)s1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.26",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(4.2\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t5",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.5",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)xr3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)sc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xh",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.29",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.13.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)eo3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(3i\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)t3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)xt3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8a\\)ew1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(27\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xk2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sec2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)xe",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.0",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xd1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)w5\\(22b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(24\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1.1\\)pi",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2dx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(9.4\\)da",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ga",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.20",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(16\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)bc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3ym",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ec1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12m\\)",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)ja1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)ew",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)s2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)sl6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2\\)xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(14\\)gs2",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(6e\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12.02\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.28",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sy03",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14\\)st3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5e\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.24",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2wa3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.35",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2x",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)st1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zj3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xq",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)mb12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2seb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5f\\)",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.40",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bc2i",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(22b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3\\)xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ewa",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.19",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(17\\)cc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(3\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.36",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xn",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(4\\)xaf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)st7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zi",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.51",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(9\\)xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14\\)s8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yj",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.40",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)mr1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2eu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xq1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)eu1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yf",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xe3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(16\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.19.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sz2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(36\\)ca4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.19.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.7",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "4.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)t5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.15",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "4.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)xa3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(30\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(6\\)t1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.8.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)sl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(22\\)sy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8.2\\)sa6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(1\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)sl",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)bc1a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxe1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)s7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.33.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8\\)ea1b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.34",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zj",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.41",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)t2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yq1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(27b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sed",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xh",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.13.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xb15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9a\\)bc7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)ex",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.1.89",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(10\\)bc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0wx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.26",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(13a\\)bc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)e4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2so",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(23a\\)bc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2su",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.58",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xg",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(11\\)b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)w5\\(22b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)e2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2n",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.33.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)mc2c",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12c\\)e7",
         },
         {
            model: "bsd",
            scope: "eq",
            trust: 1,
            vendor: "bsd",
            version: "4.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)s14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(3d\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xj1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yi",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.6.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(30\\)s4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.67",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)ew2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.33",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s4a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ea2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xe4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3.4\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(22\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2mb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)t5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)ja5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(25\\)w5-27d",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xt3",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.3.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(9\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xs2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xf1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11\\)ea1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.44",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(24\\)sv1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)t1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)xi7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2cx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)db2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)t4",
         },
         {
            model: "dragonflybsd",
            scope: "eq",
            trust: 1,
            vendor: "dragonflybsd",
            version: "1.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.21",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xt",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "1.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)dc2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.54",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(15\\)ia",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(19\\)gs0.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3ys",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5a\\)b5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ez",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)t8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(x\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2se",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)t10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)w5\\(18f\\)",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.0.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)ys",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)t2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(10g\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)ea1c",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7\\)ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yw",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(26a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(12c\\)ev01",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12.05\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)t7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.52",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.69",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(11b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yd2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.34",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)by",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)t3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2fy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6.5\\)ec3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xv",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.31",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)t3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)yy3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.21.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)t3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(7c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0db",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s9",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.6.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)s",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(6b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)yb4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.50",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(23a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sxf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(26\\)sv",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.4",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.5.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.32",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xm",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(36\\)cc2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)jk4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1x\\(l\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)st8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)eo1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sxb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28\\)w5-30b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.20",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5.2\\)xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(24\\)sv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sv3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)s10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ez",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.47",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)sl2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(16.5\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ea1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)ew",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)t4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.47",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15\\)sl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(10c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)ya1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zd3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(31\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(13a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(4\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ewa4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3.6\\)w5\\(9.0.5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8a\\)ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17d\\)sxb8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)xr6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.63",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14\\)w5\\(20\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)ew5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(21b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(26b\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.32",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)s8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)ex2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3.3\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(11\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sp",
         },
         {
            model: "windows server 2008",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(22\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yb5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8\\)sa3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sec",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.57",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)t1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)sp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)e8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xb3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(21a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3ha",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)st6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xm",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.33",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)xi4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xr2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5a\\)e",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.60",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(23.6\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(16\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)sl",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.3.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.5",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "4.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.39",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xy6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)t12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yc2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)e1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)db",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1ca",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yq3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)xi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zk",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s5a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xd4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(23f\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yk",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.55",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.17",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9a\\)bc2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zj2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)yu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xa5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.19",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.53",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1e",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)ea4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1.1\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.22",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)w5\\(18g\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4.3\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)s7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(30\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(10\\)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(22\\)s5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12.02\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)t9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)e12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(13\\)wt6\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15.1\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)da1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(31\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(4\\)t2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1eu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(27\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.21",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(27\\)sbc",
         },
         {
            model: "midnightbsd",
            scope: "eq",
            trust: 1,
            vendor: "midnightbsd",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)t9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(16.1\\)b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.29",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)st1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2za",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(4.3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(15\\)bc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(3.3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17f\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sz",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.30",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(6.8\\)t0a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.28",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.11",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ewa1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)yc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)xr2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.17",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.7",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "2.0.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17d\\)sxb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(12\\)s3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)t9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)s3b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5.1\\)xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)xl3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.18",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7.4\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xi",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)mc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)s5a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)s2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(18.4\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)b2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)db2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)t6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)su2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14\\)st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3a\\)t7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xn",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.29",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.18",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(16\\)sc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)dc",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(4\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17b\\)sxa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xs1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sy1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.19",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(6f\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sv2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xe4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(18\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)db",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)ya",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sy",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1db",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.28",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2pb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7a\\)e6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(4\\)mr",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)s13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15\\)s7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)dc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(12\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.21",
         },
         {
            model: "dragonflybsd",
            scope: "eq",
            trust: 1,
            vendor: "dragonflybsd",
            version: "1.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)e",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.8",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.44",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ea2a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(10\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(15b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2.2\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xm",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(22\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)ea1a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12g\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1m",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ye",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.41",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)yv",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.38",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2da",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.37",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(22\\)s2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(16\\)p",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)b1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)seb4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)e6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.22",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(18\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)t1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7\\)da3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2jx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)xm7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(15\\)g",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)s",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.18",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.5",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(23\\)sv1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.23",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.38",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(7\\)db1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.50",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17\\)zd3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(11a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(16\\)b1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xe3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xj",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.25",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.37",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xd",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sbc",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)st6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ew",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.0.1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.6",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.16",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(18\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)bc1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "1.1.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20\\)st2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(12e\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)s15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(8\\)p",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)s7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)yy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xg4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(5\\)ca1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(7\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12.05\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(13\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)jk1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1ct",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)t8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xn1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(19\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xc2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.17",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(9\\)s8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)seb2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.24",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0.12\\(a\\)bt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)e10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(26e\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.36",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)t15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1.3\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)e3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1.4\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)xz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3jk",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ec",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.21",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)se",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(7\\)aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xa5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zj",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.31",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)e5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14.5\\)t",
         },
         {
            model: "bsd",
            scope: "eq",
            trust: 1,
            vendor: "bsd",
            version: "4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17d\\)sx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(6d\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)ew",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xb4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.24",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(28\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)yx1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)cz3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14.5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)t11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(12a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(24\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)t6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xb11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.35.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.15",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8b\\)e14",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.18",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(24\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xe2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sxa",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(10\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.26",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8\\)ea",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(5\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc3b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.33.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(8\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)e5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)jk2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.2.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ex",
         },
         {
            model: "dragonflybsd",
            scope: "eq",
            trust: 1,
            vendor: "dragonflybsd",
            version: "1.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(1\\)st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3jea",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)t3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(22\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(24\\)s1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.22",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(25\\)w5\\(27c\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xw1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)t4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)dc2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.25",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)yg1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(9\\)ia",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)mb13c",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.0\\(20.3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yo",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(11\\)t9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xw",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.10",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.15.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5.4\\)wc1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(27\\)sv1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(9a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ey",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2sh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(3\\)t2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.35",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.13",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.19.4",
         },
         {
            model: "windows server 2003",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(8.0.2\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)t9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.32",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)st7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xk3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.25",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3wa4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.22",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "2.0.4",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yr",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17d\\)sxb10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ax",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yb",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.64",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)ym4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2zg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(14\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(2\\)xf5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)sl1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xs",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "6.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2b\\)",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.5.1",
         },
         {
            model: "catalyst blade switch 3120",
            scope: "lt",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(50\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(28\\)w5\\(31a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)ea5a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.20",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.33",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(17d\\)sxb7",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.37",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)t8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xr",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7.7\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(6.8a\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.38",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.59",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(3d\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)w5\\(28\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xs",
         },
         {
            model: "windows xp",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.45",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(12\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3a\\)xi8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zd4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xf",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.13.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)xp4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(15\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sw4a",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xg1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.25",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yf2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ew2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(26\\)p2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)dd3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xb",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)mb13b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.26",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(22\\)ea6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yf3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(22\\)sv1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(11b\\)e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2pi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(3.4\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.32",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(13\\)zk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)t12",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(18\\)st1",
         },
         {
            model: "dragonflybsd",
            scope: "eq",
            trust: 1,
            vendor: "dragonflybsd",
            version: "1.10.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "bsd os",
            scope: "eq",
            trust: 1,
            vendor: "bsdi",
            version: "1.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "6.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yz",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.38",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)t1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)ewa3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(20a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(8\\)xu2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(16\\)bx",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "4.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yi",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.22.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)ewa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)yi1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ec2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)ew",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yk1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)ya11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.31",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(12h\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)t4",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1,
            vendor: "netbsd",
            version: "1.5",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sz1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(27\\)sv1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(15\\)ca",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yk2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(19\\)sl4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)s4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(14\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "9.14",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0da",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5c\\)ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(23\\)sw",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(30\\)s2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)ewa3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.27",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xh3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)s5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.10",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(7\\)da",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(8.3\\)sc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(16\\)ia",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(28a\\)ct",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2gs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxd7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(3e\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(13a\\)bc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(27\\)sv2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(3a\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.1",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(4\\)xm4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(13\\)ca",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.46",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5c\\)e12",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.0.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2bx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(19\\)e1",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "2.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2bc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(9e\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(17\\)sl9",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.43",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.11",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.1",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(26\\)w5\\(28a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(15\\)sc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.21.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.29",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(21\\)sx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)eo1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)e3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(10\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)bx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2sa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)za",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0wc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)dc1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.43",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)fx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(10d\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.20.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.0",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.3",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.17.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)xk",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(31\\)s1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.30",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.27",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.34",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)db1",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.2.15",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.27",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)ew4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(5\\)wc9a",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.23.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(6\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bc2f",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(7\\)cx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14\\)sy",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.18.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)s4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(3\\)xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(4\\)t",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.47",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2p",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(24\\)s2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18\\)sxd6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(18\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yk",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "1.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(20\\)ew4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(2a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)e12",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4md",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)zj1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xh",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.14.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.2\\(26b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3yn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(29a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(13\\)ay",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "10.3\\(19a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5e\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)s1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(14\\)yu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(5d\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.0.23",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.18",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(2\\)xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(20\\)ew2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(7b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xf",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.17",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(25\\)sg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2bw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(1a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(14.5\\)",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.5.19",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(2\\)xf4",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1,
            vendor: "openbsd",
            version: "3.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3\\(8\\)db2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(16\\)b",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.16.35",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(7\\)xi3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4\\(2\\)t4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(13\\)s6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5\\)dc",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.28",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(5a\\)b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(15\\)bc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(7\\)wx5\\(15a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(4\\)xg2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(14\\)e9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(18.2\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(6\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(26\\)eb1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(2\\)xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(2\\)xa4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0\\(23\\)sz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3xi",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.11",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(1\\)xh",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.6.21.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.3da",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xd",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "6.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.3\\(11\\)yk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "11.1\\(13\\)ia",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2\\(10\\)da4",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.4.2",
         },
         {
            model: "kernel",
            scope: "eq",
            trust: 1,
            vendor: "linux",
            version: "2.3.4",
         },
         {
            model: "catos glx",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "check point",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "extreme",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "force10",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "linux kernel archives",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "the sco group",
            version: null,
         },
         {
            model: "seil/b1",
            scope: null,
            trust: 0.8,
            vendor: "internet initiative",
            version: null,
         },
         {
            model: "seil/neu",
            scope: "eq",
            trust: 0.8,
            vendor: "internet initiative",
            version: "128",
         },
         {
            model: "seil/neu",
            scope: "eq",
            trust: 0.8,
            vendor: "internet initiative",
            version: "2fe plus",
         },
         {
            model: "seil/turbo",
            scope: null,
            trust: 0.8,
            vendor: "internet initiative",
            version: null,
         },
         {
            model: "seil/x1,x2",
            scope: null,
            trust: 0.8,
            vendor: "internet initiative",
            version: null,
         },
         {
            model: "opensolaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "(sparc)",
         },
         {
            model: "opensolaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "(x86)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "10 (sparc)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "10 (x86)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "8 (sparc)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "8 (x86)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "9 (sparc)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "9 (x86)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "7.x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "8.x",
         },
         {
            model: "connectra",
            scope: null,
            trust: 0.8,
            vendor: "check point",
            version: null,
         },
         {
            model: "vpn-1 power vsx",
            scope: null,
            trust: 0.8,
            vendor: "check point",
            version: null,
         },
         {
            model: "vpn-1 power/utm",
            scope: null,
            trust: 0.8,
            vendor: "check point",
            version: null,
         },
         {
            model: "vpn-1 pro/express",
            scope: null,
            trust: 0.8,
            vendor: "check point",
            version: null,
         },
         {
            model: "proxysg",
            scope: "lte",
            trust: 0.8,
            vendor: "blue coat",
            version: "6.1",
         },
         {
            model: "sgos",
            scope: "eq",
            trust: 0.8,
            vendor: "blue coat",
            version: "4",
         },
         {
            model: "sgos",
            scope: "eq",
            trust: 0.8,
            vendor: "blue coat",
            version: "5",
         },
         {
            model: "sgos",
            scope: "eq",
            trust: 0.8,
            vendor: "blue coat",
            version: "6",
         },
         {
            model: "windows 2000",
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows server 2003",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "none",
         },
         {
            model: "windows server 2003",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(itanium)",
         },
         {
            model: "windows server 2003",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(x64)",
         },
         {
            model: "windows server 2008",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(itanium)",
         },
         {
            model: "windows server 2008",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(x64)",
         },
         {
            model: "windows server 2008",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(x86)",
         },
         {
            model: "windows vista",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "none",
         },
         {
            model: "windows vista",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(x64)",
         },
         {
            model: "windows xp",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "(x64)",
         },
         {
            model: "windows xp",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "sp3",
         },
         {
            model: "rt100i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt102i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt103i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt105 series",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt107e",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt140 series",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt200i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt56v",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt58i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt60w",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rt80i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rta50i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rta52i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rta54i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rta55i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rtw65b",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rtw65i",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rtx1200",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "rtx3000",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "srt100",
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "fitelnet-e series",
            scope: "eq",
            trust: 0.8,
            vendor: "furukawa electric",
            version: "fitelnet-e20/e30",
         },
         {
            model: "fitelnet-f series",
            scope: "eq",
            trust: 0.8,
            vendor: "furukawa electric",
            version: "fitelnet-f3000",
         },
         {
            model: "fitelnet-f series",
            scope: "eq",
            trust: 0.8,
            vendor: "furukawa electric",
            version: "fitelnet-f40",
         },
         {
            model: "fitelnet-f series",
            scope: "eq",
            trust: 0.8,
            vendor: "furukawa electric",
            version: "fitelnet-f80/f100/f120/f140/f1000/f2000",
         },
         {
            model: "mucho series",
            scope: null,
            trust: 0.8,
            vendor: "furukawa electric",
            version: null,
         },
         {
            model: "ip38x series",
            scope: null,
            trust: 0.8,
            vendor: "nec",
            version: null,
         },
         {
            model: "ios 12.4 gc1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "windows vista business 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows vista edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "x640",
         },
         {
            model: "ios 12.3b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "email and web security appliance patch",
            scope: "ne",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.14",
         },
         {
            model: "ios 12.4 xm3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xz2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 95",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access gateway enterprise edition",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "9.1.100.3",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.3.3",
         },
         {
            model: "bigip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "5.2.4.3",
         },
         {
            model: "ios 12.2yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3(7)",
         },
         {
            model: "ios 12.2sb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista enterprise 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2 sb2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 54",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "rt140i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "opensolaris build snv 93",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt105i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "windows server datacenter edition sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "windows vista enterprise 64-bit edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "ios 12.4 t5e",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center manager server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7.0",
         },
         {
            model: "ios 12.2sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server enterprise edition itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "ios 12.3yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home basic",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2zh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "pix/asa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(4.18)",
         },
         {
            model: "networks self service video server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "ios 12.2yr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.3.1",
         },
         {
            model: "ios 12.3xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "linux enterprise sp2 debuginfo",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "ios 12.0xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s12",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "ios 12.0xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server for 32-bit systems",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20080",
         },
         {
            model: "ios 12.1gb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos clr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "opensolaris build snv 121",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.1da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server enterprise edition itanium sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "wanjet",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "ios 12.1xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xw10",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rtx3000",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "bigip local traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.8",
         },
         {
            model: "opensolaris build snv 99",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "messaging application server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "linux enterprise sp1 debuginfo",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "cms server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "15.0",
         },
         {
            model: "networks ethernet routing switch 4526fx",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "ios 12.2zl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp tablet pc edition sp3",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "networks ethernet routing switch 2526t-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "2500",
         },
         {
            model: "rfc requirements for internet hosts communic",
            scope: "eq",
            trust: 0.3,
            vendor: "ietf",
            version: "1122:0",
         },
         {
            model: "networks ethernet routing switch 4524gt-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2",
         },
         {
            model: "windows vista business sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(18)",
         },
         {
            model: "ios 12.3jl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks switched firewall sfa-6400",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "networks multimedia comm mas",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "point vpn-1 pro/express r70.1",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "ios 12.3jea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "5.0.1",
         },
         {
            model: "windows vista ultimate 64-bit edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.4(5)",
         },
         {
            model: "solaris 8 sparc",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "bigip global traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3.1",
         },
         {
            model: "ios 12.4 jk4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center agent desktop display",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "ios 12.3xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista enterprise 64-bit edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "0",
         },
         {
            model: "networks ethernet routing switch 5698tfd-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "opensolaris build snv 100",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 124",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "rfc requirements for internet hosts applicat",
            scope: "eq",
            trust: 0.3,
            vendor: "ietf",
            version: "1123:0",
         },
         {
            model: "ios 12.2yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 123",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(3)",
         },
         {
            model: "opensolaris build snv 49",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows server web edition sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks ethernet routing switch 2550t",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "2500",
         },
         {
            model: "ios 12.4jma",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows advanced server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19.2)",
         },
         {
            model: "access gateway enterprise edition",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "8.1.68.7",
         },
         {
            model: "ios 12.0wc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 114",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.0xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "suse linux retail solution",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "8.0",
         },
         {
            model: "networks self-service ccss7",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "networks self-service peri nt server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "linux enterprise desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "opensolaris build snv 128",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2 sxh5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 85",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 19",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows vista edition sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "x64",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "70000",
         },
         {
            model: "opensolaris build snv 107",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "5.0.2",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.157.3",
         },
         {
            model: "opensolaris build snv 45",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.2",
         },
         {
            model: "ios 12.3yx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server datacenter edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "ios 12.0xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "ios 12.1xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sra",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "cms server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "14.1",
         },
         {
            model: "suse linux standard server",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "8.0",
         },
         {
            model: "ios 12.2cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ay",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt105p",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "opensolaris build snv 78",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2by",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 108",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "bigip wan optimization module",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "ios 12.2 sxf16",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 28",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.1xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self-service peri workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "windows advanced server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.2b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0.3",
         },
         {
            model: "ios 12.2zx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip application security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3.1",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(25)",
         },
         {
            model: "ios 12.2sq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 89",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows server standard edition sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks callpilot 703t",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ios 12.2xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(4)",
         },
         {
            model: "ir",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.0",
         },
         {
            model: "windows datacenter server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.3jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 39",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "5.2.2.5",
         },
         {
            model: "open-enterprise-server",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "0",
         },
         {
            model: "ios 12.4 xe4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "8600",
         },
         {
            model: "rt102i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.0xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip global traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.8",
         },
         {
            model: "point vpn-1 pro/express r62 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "01",
         },
         {
            model: "cms server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "14.0",
         },
         {
            model: "ios 12.4jdd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 90",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 68",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "suse linux school server for i386",
            scope: null,
            trust: 0.3,
            vendor: "s u s e",
            version: null,
         },
         {
            model: "ios 12.2svd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "windows server for itanium-based systems",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20080",
         },
         {
            model: "ios 12.1xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.1",
         },
         {
            model: "opensolaris build snv 67",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 120",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2ze",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxi1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp home sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "opensolaris build snv 51",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4 t1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access gateway enterprise edition build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.196.4",
         },
         {
            model: "ios 12.0da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home basic sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.3xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(6)",
         },
         {
            model: "ios 12.2ey",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 77",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2src",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(2)",
         },
         {
            model: "opensolaris build snv 61",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.0xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(17)",
         },
         {
            model: "ios 12.2ez",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rta54i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.3xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(1)",
         },
         {
            model: "ios 12.2dd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.3",
         },
         {
            model: "ios 12.0xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0st",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 82",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows vista sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "5.2.4.8",
         },
         {
            model: "opensolaris build snv 29",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "nx-os 4.0 n2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "pix/asa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2.3)",
         },
         {
            model: "ios 12.1yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center express",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "opensolaris build snv 41",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "networks ethernet routing switch 4524gt",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "ios 12.2sxb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.8",
         },
         {
            model: "windows vista business 64-bit edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "0",
         },
         {
            model: "ios 12.4xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 126",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.1xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2seg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software vpn-1 power/utm r62 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "01",
         },
         {
            model: "ios 12.4yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ey",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip application security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.8",
         },
         {
            model: "ios 12.2xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self-service mps",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1000",
         },
         {
            model: "ios 12.4 md7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server enterprise edition sp1 beta",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20031",
         },
         {
            model: "bigip global traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3",
         },
         {
            model: "ios 12.2svc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "8",
         },
         {
            model: "ios 12.1xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows advanced server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.1xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 ja1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "pix/asa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2.79)",
         },
         {
            model: "ios 12.2seb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp media center edition sp3",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2yy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista ultimate sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "networks ethernet routing switch 5650td",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "ios 12.2xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos 8.4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "pix/asa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.0(4.9)",
         },
         {
            model: "rt200i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "netscaler",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "9.1.100.3",
         },
         {
            model: "opensolaris build snv 130",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2fy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xo",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server enterprise edition sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "ios 12.1yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
         {
            model: "networks callpilot 600r",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "windows server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "opensolaris build snv 105",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4jmb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch 2526t",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "2500",
         },
         {
            model: "ios 12.2so",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server standard edition sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "ios 12.2s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "coat systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "ios 12.4ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "access gateway enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.0",
         },
         {
            model: "ios 12.2yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "linux enterprise sdk sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "netscaler access gateway enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.0",
         },
         {
            model: "windows vista",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "0",
         },
         {
            model: "networks ethernet routing switch 4550t",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "windows server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "bigip sam",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "8.0",
         },
         {
            model: "ios 12.2sxf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 88",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2ixc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt58i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.4 jdc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sy10",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks symposium agent",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ios 12.2ixd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point vpn-1 pro/express r60 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "07",
         },
         {
            model: "cms server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "16.0",
         },
         {
            model: "opensolaris build snv 111",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.6(1)",
         },
         {
            model: "ios 12.1ev",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 118",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "ios 12.2jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home premium sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.4jdc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 59",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows datacenter server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "access gateway enterprise edition build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.070.5",
         },
         {
            model: "ios 12.0xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5)",
         },
         {
            model: "ios 12.2xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center administration ccma",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "6.0",
         },
         {
            model: "ios 12.3jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home basic 64-bit edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.3ym",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows advanced server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "opensolaris build snv 112",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "stonegate ssl vpn engine",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.3.1",
         },
         {
            model: "ios 12.2bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4mr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yx14",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "messaging application server mm",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "ios 12.2sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sve1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.3.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(6)",
         },
         {
            model: "windows server datacenter edition itanium sp1 beta",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20031",
         },
         {
            model: "windows server for x64-based systems sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2008",
         },
         {
            model: "ios 12.0xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "5.2.6",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.6",
         },
         {
            model: "solaris 8 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "opensolaris build snv 96",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4 t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home basic 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.4yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.4",
         },
         {
            model: "ios 12.2fz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows professional sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "networks contact center manager server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "windows vista edition sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "x64",
         },
         {
            model: "ios 12.2fx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks switched firewall sf/vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5124",
         },
         {
            model: "ios 12.4jda",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "networks self-service mps",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "ios 12.1ez",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch 5698tfd",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "bigip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.8",
         },
         {
            model: "ios 12.2xo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2irb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista business sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "bigip global traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "ios 12.4mda",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software vpn-1 power/utm r65 ipso ga",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "6",
         },
         {
            model: "ios 12.3yt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 36",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "networks ethernet routing switch 4526g-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "opensolaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "0",
         },
         {
            model: "ios 12.2see",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.3.7",
         },
         {
            model: "opensolaris build snv 48",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "ios 12.2 sb1b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server web edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(20)",
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "9",
         },
         {
            model: "windows professional sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "rt107e",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(12)",
         },
         {
            model: "windows server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.2ira",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 94",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "5.0.2",
         },
         {
            model: "windows advanced server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.3yq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "novell linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "9.0",
         },
         {
            model: "ios 12.4 xg4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.5",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.2.6.1",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "10.2",
         },
         {
            model: "ios 12.3za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista business",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2yk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2dx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "networks secure network access identity engine ignition analytics",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "networks switched firewall sf-5114",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3(4)",
         },
         {
            model: "ios 12.4 jl1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sga9",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wanjet",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.0.2",
         },
         {
            model: "opensolaris build snv 50",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.0sp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "email and web security appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "mcafee",
            version: "5.1",
         },
         {
            model: "ios 12.2zd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "srt100",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.4 xd12",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server for x64-based systems",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20080",
         },
         {
            model: "ios 12.2 srd1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "netscaler access gateway enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.1",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "8.047.8",
         },
         {
            model: "ios 12.4xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center administration ccma",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7.0",
         },
         {
            model: "ios 12.4xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt103i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "windows server itanium sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "5.0.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(1)",
         },
         {
            model: "windows xp home sp3",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self-service media processing server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "ios 12.0xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista enterprise sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2zp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "ios 12.2xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server datacenter edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "bigip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3",
         },
         {
            model: "ios 12.2ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch 4550t-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "opensolaris build snv 01",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "rt80i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "opensolaris build snv 92",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2xnc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3va",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks secure network access switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-40500",
         },
         {
            model: "ios 12.2xnd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xl4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 83",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 106",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4 ja",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "windows vista ultimate 64-bit edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "networks ethernet routing switch 4526t-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "linux enterprise desktop sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "ios 12.2xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 125",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2sbc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip local traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.6.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(4)",
         },
         {
            model: "ios 12.2yv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks self service cdd",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "ios 12.1ga",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch 2550t-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "2500",
         },
         {
            model: "rt100i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.2xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "bigip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.8",
         },
         {
            model: "ios 12.4xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self-service ccxml",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "coat systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "5.2.2.5",
         },
         {
            model: "ios 12.0xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sed",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks secure network access identity engine ignition posture",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "ios 12.2sm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4md",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks callpilot 1005r",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "windows server enterprise edition sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks self-service peri application",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.1",
         },
         {
            model: "opensolaris build snv 76",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows xp professional edition sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "x64",
         },
         {
            model: "ios 12.2xna",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software vpn-1 power/utm r60 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "07",
         },
         {
            model: "ios 12.1eb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.196.4",
         },
         {
            model: "point vpn-1 power vsx ngx r65",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "0",
         },
         {
            model: "opensolaris build snv 101a",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.3bw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 111a",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.1yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.11",
         },
         {
            model: "ios 12.3yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 87",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "windows vista home premium sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.3yz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t6a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ewa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp professional sp3",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software connectra r62 cm hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "01",
         },
         {
            model: "wanjet",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2.8",
         },
         {
            model: "ios 12.3xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home premium 64-bit edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "0",
         },
         {
            model: "ios 12.3xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 mda",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate ssl vpn engine",
            scope: "ne",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.4",
         },
         {
            model: "networks self-service peri ctx",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(1)",
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.5.2",
         },
         {
            model: "ios 12.2ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "9",
         },
         {
            model: "opensolaris build snv 113",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2zc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software connectra r66.1",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "networks contact center manager server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "6.0",
         },
         {
            model: "networks ethernet routing switch 5650td-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "ios 12.4 yb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 57",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows xp tablet pc edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "linux enterprise server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "windows server enterprise edition itanium sp1 beta",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20031",
         },
         {
            model: "netscaler",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.0",
         },
         {
            model: "ios 12.4xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4gc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "firepass",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "6.0",
         },
         {
            model: "ios 12.1yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.2.8.7",
         },
         {
            model: "networks ethernet routing switch 4526gtx",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "rta50i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "opensolaris build snv 119",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "bigip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4.5",
         },
         {
            model: "ios 12.4xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1az",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.0",
         },
         {
            model: "ios 12.2da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea13",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home basic 64-bit edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5.3)",
         },
         {
            model: "ios 12.2xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software vpn-1 power/utm r70.1",
            scope: null,
            trust: 0.3,
            vendor: "check",
            version: null,
         },
         {
            model: "point vpn-1 power vsx vsx-1",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "0",
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.2",
         },
         {
            model: "coat systems proxysg 200-c",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "bigip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.1",
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.3",
         },
         {
            model: "bigip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "ios 12.2yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "cms server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "16.1",
         },
         {
            model: "windows datacenter server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "opensolaris build snv 110",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "bigip local traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.6",
         },
         {
            model: "ios 12.2sga",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(15)",
         },
         {
            model: "windows datacenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "rt60w",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.1dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server for itanium-based systems sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2008",
         },
         {
            model: "networks switched firewall sfa-6600",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.0",
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.0",
         },
         {
            model: "ios 12.0sl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "windows server itanium sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "ios 12.2sxh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt140p",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.2xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sm5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip local traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4",
         },
         {
            model: "ios 12.1eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 sw3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "messaging application server mm",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.1",
         },
         {
            model: "ios 12.3jeb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip application security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3",
         },
         {
            model: "windows vista ultimate",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows server for 32-bit systems sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2008",
         },
         {
            model: "networks secure network access switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-40700",
         },
         {
            model: "ios 12.1xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks callpilot 201i",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ios 12.4 xy4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 se",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home premium",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "wanjet",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "5.0",
         },
         {
            model: "linux enterprise desktop sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "coat systems director",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.2.2.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.2",
         },
         {
            model: "ios 12.2 sq2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt105",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.3",
         },
         {
            model: "opensolaris build snv 122",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.1yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 131",
            scope: "ne",
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 109",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(5)",
         },
         {
            model: "netscaler build",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.070.5",
         },
         {
            model: "ios 12.0sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(2)",
         },
         {
            model: "ios 12.2 se5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point vpn-1 pro/express r65 ipso ga",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "6",
         },
         {
            model: "ios 12.3yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self-service mps",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "10000",
         },
         {
            model: "ios 12.1ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.8",
         },
         {
            model: "bigip global traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "ios 12.3xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(10)",
         },
         {
            model: "point vpn-1 pro/express r65 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "50",
         },
         {
            model: "netscaler",
            scope: "ne",
            trust: 0.3,
            vendor: "citrix",
            version: "8.1.68.7",
         },
         {
            model: "ios 12.4xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 102",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.1ey",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "solaris 9 sparc",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 02",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.3eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista ultimate 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2su",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "enterprise manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "1.4.1",
         },
         {
            model: "point software connectra r62 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "01",
         },
         {
            model: "ios 12.4xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sca",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows datacenter server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.2sef",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ew",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sz10",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip local traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3.5",
         },
         {
            model: "ios 12.1xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt105e",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "opensolaris build snv 80",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4sw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt140f",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.2se",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip psm",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "networks contact center administration",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "ios 12.1eo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 ya2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 104",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.3yk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "coat systems proxysg 8100-c",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "ios 12.2yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks callpilot 202i",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "windows professional sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.3xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0w",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "10.1",
         },
         {
            model: "rt56v",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "opensolaris build snv 38",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19)",
         },
         {
            model: "ios 12.2 ixh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "ios 12.2yz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks callpilot 1002rp",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ios 12.2sxe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 129",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(16)",
         },
         {
            model: "ios 12.4 md2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.2.1.6",
         },
         {
            model: "ios 12.2 se2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 jdd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center ncc",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "ios 12.2xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center cct",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "ios 12.2scb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rtw65i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "networks ethernet routing switch 4548gt-pwr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "ios 12.1xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 mr2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "networks switched firewall sf-5109",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "stonegate ssl vpn engine",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.1",
         },
         {
            model: "networks self-service peri ivr",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "ios 12.2zy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip global traffic manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4",
         },
         {
            model: "bigip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "ios 12.2 srb5a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "networks self-service wvads",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "ios 12.2sve",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2irc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "windows server web edition sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "ios 12.3 ym13",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 jx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sy8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 84",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "ios 12.2 sb14",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sb13",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "messaging application server mm",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "ios 12.2zj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.2",
         },
         {
            model: "ios 12.2mb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "linux enterprise server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "ios 12.2ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp media center edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.1ew",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 98",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2xnb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rta55i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.1ax",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da14",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server datacenter edition itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "opensolaris build snv 117",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "messaging application server mm",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1",
         },
         {
            model: "ios 12.2yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 58",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "networks contact center manager",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(7)",
         },
         {
            model: "ios 12.2sv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home basic sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip webaccelerator",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4",
         },
         {
            model: "ios 12.2srd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip wan optimization module",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0.1",
         },
         {
            model: "ios 12.2sva",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self-service speech server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "nexus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50000",
         },
         {
            model: "opensolaris build snv 22",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "networks contact center tapi server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "ios 12.0 sy9a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 81",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.3xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate high availability firewall and vpn",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2.10",
         },
         {
            model: "ios 12.2bz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip application security manager",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.4",
         },
         {
            model: "opensolaris build snv 103",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "5.2",
         },
         {
            model: "ios 12.3xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "linux enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "ios 12.2 sg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ym",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center multimedia & outbound",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "6.0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(3)",
         },
         {
            model: "ios 12.0t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "linux enterprise",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "11",
         },
         {
            model: "rta52i",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "ios 12.4ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "stonegate ips sensor and analyzer",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "4.2",
         },
         {
            model: "ios 12.2xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch 4526t",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "4500",
         },
         {
            model: "rtx1200",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "networks secure network access identity engines ignition server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "nx-os",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(4)",
         },
         {
            model: "windows vista enterprise",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2ste",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "ios 12.2cz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista ultimate sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2yw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rtw65b",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "windows vista home premium 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2 zya1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "ios 12.2xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 13",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "cms server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "16.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "access gateway enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "citrix",
            version: "9.1",
         },
         {
            model: "opensolaris build snv 91",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2 scb1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "10",
         },
         {
            model: "ios 12.3tpc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jed",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 47",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.2.10",
         },
         {
            model: "opensolaris build snv 64",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2 irc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "10.0",
         },
         {
            model: "ios 12.4 jda3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 37",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 101",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows professional sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.3 bc9",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 115",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.3bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "solaris 10 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.3ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 src3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks self service voicexml",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "0",
         },
         {
            model: "windows vista enterprise sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.4xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt140e",
            scope: "eq",
            trust: 0.3,
            vendor: "yamaha",
            version: "0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(9)",
         },
         {
            model: "ios 12.4 md",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp professional sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2srb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos 7.6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10.3",
         },
         {
            model: "ios 12.4 xr4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista business 64-bit edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(2)",
         },
         {
            model: "linux enterprise sdk",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "solaris 9 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.2xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows vista home premium 64-bit edition sp2",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ios 12.2zb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "point software vpn-1 power/utm r65 hfa",
            scope: "eq",
            trust: 0.3,
            vendor: "check",
            version: "50",
         },
         {
            model: "ios 12.3 bc6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "suse linux openexchange server",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "4.0",
         },
         {
            model: "ios 12.4 xq2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(8)",
         },
         {
            model: "windows server datacenter edition sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "ios 12.0dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jec3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ios 12.2tpc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos 8.7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 116",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "ios 12.4 ye",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 127",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows server datacenter edition itanium sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "bigip link controller",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.3.1",
         },
         {
            model: "networks secure network access identity engine guest manager",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "-0",
         },
         {
            model: "ios 12.2 mc2m",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks contact center multimedia & outbound",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7.0",
         },
         {
            model: "ios 12.0sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "opensolaris build snv 86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "windows server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            db: "BID",
            id: "31545",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(3.4\\)bp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ym:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy03:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6.8a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)bx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t1a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26\\)p5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(26\\)e3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(28\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)sy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11.5\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(20.3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)ys_1.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3ma:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)ca2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1x\\(l\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)dc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.36:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)t10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsd:bsd:4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ya:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.35.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5a\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)t7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(15b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)su2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.38:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(22\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1ct:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ay:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)cx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2pb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(5d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(27b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2n:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.6\\)w5\\(9.0.5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1a\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(23\\)e4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10\\)da2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)tpc10a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.99.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3bw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.37:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1ia:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-32a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)e6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(16\\)p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)db1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sx1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.28:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0.12\\(a\\)bt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3na:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(20\\)aa4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\)aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(18\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)xaf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(15a\\)p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(15\\)g:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s4a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20.4\\)sp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)xi8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2i:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)cz3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zo:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)ys:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ew4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(27\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4.3\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14.5\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17\\)zd3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)dd3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(9\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23f\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(24\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19.3\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.50:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.24:rc3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.51:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.39:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.33:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.26:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13.4\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2pi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(9.4\\)da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:4.1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.42:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(16\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24.2\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)eb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc5a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)e3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(26\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)e7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mx1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17\\)a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(3d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sv2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2mx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(3.4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(15\\)bc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7.7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(3e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.27:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2.2\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.1.132:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.26:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.10.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(17\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(15\\)ia:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2sa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(7\\)ca:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(18\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(7\\)db1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(05\\)wc8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(4.2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(4.3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(8\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1ca:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(19\\)gs0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(16\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)w5\\(22b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s5a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25.4\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1.3\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-30b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)fc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14.5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)e7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(26\\)eb1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)eb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)e12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)dx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ya2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yb5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yd2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)da1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10g\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16\\)b1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\)ec3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xy6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xs2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xu1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.02\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17f\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(19\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(29a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(26\\)sv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(12b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)yc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw3a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(5\\)ca1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6.8\\)t0a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2seb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16\\)bx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18.2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)by2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(31\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)yb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(6c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(17\\)bt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(18\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11b\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(14\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2wa4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(7\\)aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(10c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3j:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)ys:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5f\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.43:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.44:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.24:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.34:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)cx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)e12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xm7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xg5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)dc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xm4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)ze:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10.5\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)so4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ewa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)by:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zo:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)t3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(15\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.45:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:p7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:p6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3ha:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8.9\\)sa6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26\\)p2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(22b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(26b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(9\\)ia:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5\\(31a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.4\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)e3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(27b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5a\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1.1\\)pi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\)da8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(10\\)da4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)e8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)jk2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sy1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23.6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)bc3c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1.4\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23\\)sw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(28c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16f\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)ea6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(17\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2x:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.27:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)eo1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3tpc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.48:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.40:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.49:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.34.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.35:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.52:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.51:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ev01:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xv5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2h:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)xr2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(30\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsd:bsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)ya1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xe4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:midnightbsd:midnightbsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(19a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(2\\)xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)cc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2wa3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(14\\)gs2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(x\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(8\\)db2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3wa4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)ca4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2gs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(4\\)xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(19a\\)gs6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.0\\(22a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(28a\\)ct:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(28a\\)ia:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(23a\\)bc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)dc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(23\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5-27d:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.3\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)e5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10.5\\)ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ya:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yh3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xr2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xz7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)xz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)ja1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.05\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yx1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14.5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)db1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xt3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea2b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)sl1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)t16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12g\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)s14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)yp1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yi1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ey:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)t9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3a\\)e8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)t5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)zc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12h\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12i\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12m\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(12.02\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)b1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(21b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7.4\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2jx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yk1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16.1\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17a\\)sxa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xi2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1b\\)da1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(21\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)bc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2eu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zl1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(22\\)sv1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(27\\)sv1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xw1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(12e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:10.3\\(3.3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(36\\)cc4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1\\(24c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(11b\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(18.4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(15b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)xu2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ye:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xc2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6f\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xg1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)t5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(16\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(6a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)t10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)xq1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(5\\)b1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(4\\)t8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.41:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.32:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.25:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.22.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.47:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.46:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.34:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.35:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.34.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.53:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ex2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)aa1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5\\)yf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)ea1e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(4\\)db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(3\\)xp4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1\\)t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(1.1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13\\)mc1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(14\\)za:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(13.03\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(11\\)t3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15.1\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(16.5\\)s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)zj1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(15\\)xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xt3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(2\\)xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(4\\)t3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(23\\)sv1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(26b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(26\\)sv1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(7\\)da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:-:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:dragonflybsd:dragonflybsd:1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:p2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:bsdi:bsd_os:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:0.4_1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.1:p5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:trustedbsd:trustedbsd:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(11\\)yj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(14\\)yt1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ys:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3yi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:4.1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.24:rc2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.23.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.3.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.33.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:-:sp4:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catalyst_blade_switch_3020_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.2\\(50\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catalyst_blade_switch_3120_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.2\\(50\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catalyst_blade_switch_3120x_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.2\\(50\\)",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Robert E. Lee and Jack C. Lewis",
      sources: [
         {
            db: "BID",
            id: "31545",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2008-4609",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2008-4609",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-34734",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2008-4609",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#723308",
                  trust: 0.8,
                  value: "15.59",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200810-307",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-34734",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2008-4609",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. Part of the Transmission Control Protocol (TCP) specification (RFC 1122) allows a receiver to advertise a zero byte window, instructing the sender to maintain the connection but not send additional TCP payload data. The sender should then probe the receiver to check if the receiver is ready to accept data. Narrow interpretation of this part of the specification can create a denial-of-service vulnerability. By advertising a zero receive window and acknowledging probes, a malicious receiver can cause a sender to consume resources (TCP state, buffers, and application memory), preventing the targeted service or system from handling legitimate connections. Transmission Control Protocol (TCP) Multiple implementations of service disruption (DoS) Vulnerabilities exist. RFC793 It is prescribed by Transmission Control Protocol (TCP) Implementation of service disruption due to misuse of available resources after connection establishment (DoS) Vulnerabilities exist.Service operation disrupted by a remote third party (DoS) There is a possibility of being attacked. The core TCP/IP protocol is prone to multiple remote denial-of-service vulnerabilities. \nThe issues are tracked by Cisco Bug IDs CSCsv04836, CSCsv07712, CSCsv66169, CSCsv02768, CSCsv08325, and CSCsv08579. \nThese issues are reported to affect multiple vendors' implementations of the TCP/IP stack. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nWindows 2000 TCP/IP Window Size Denial of Service Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA36597\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/36597/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Microsoft Windows 2000,\nwhich can be exploited by malicious people to cause a DoS (Denial of\nService). \n\n1) An error in the TCP/IP processing can be exploited to cause a\nsystem to stop responding to new requests by flooding it using\nspecially crafted packets with a TCP receive window size set to a\nvery small value or zero. \n\n2) An error in the TCP/IP processing can be exploited to cause\nconnections to hang indefinitely in a FIN-WAIT-1 or FIN-WAIT-2 state. \nThis can be exploited to cause a system to stop responding to new\nrequests by flooding it using specially crafted packets with a TCP\nreceive window size set to a very small value or zero. \n\nSOLUTION:\nAccording to the vendor, no patches will be made available as it\nwould require re-architecting a significant amount of the OS. \n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Jack C. Louis, Outpost24. \n2) The vendor credits Felix Lindner, Recurity Labs. \n\nORIGINAL ADVISORY:\nMS09-048 (KB967723):\nhttp://www.microsoft.com/technet/security/Bulletin/MS09-048.mspx\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c01923093\nVersion: 1\n\nHPSBMI02473 SSRT080138 rev.1 - Cisco Catalyst Blade Switch 3020/3120, Remote Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2009-11-17\nLast Updated: 2009-11-17\n\nPotential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential vulnerability has been identified with the Cisco Catalyst Blade Switch 3020/3021. The vulnerability could be exploited remotely to create a Denial of Service (DoS). \n\nReferences: CVE-2008-4609, Cisco Security Advisory: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products(cisco-sa-20090908-tcp24)\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nCisco Catalyst Blade Switch 3020 for c-Class BladeSystem running firmware earlier than v12.2(50)\nCisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP running firmware earlier than v12.2(50)\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n  Reference              Base Vector             Base Score\nCVE-2008-4609    (AV:N/AC:M/Au:N/C:N/I:N/A:C)       7.1\n===========================================================\n             Information on CVSS is documented\n            in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has provided firmware updates to resolve this vulnerability. \n\nProduct\n Firmware Version\n\nCisco Catalyst Blade Switch 3020 for c-Class BladeSystem\n 12.2(50) SE1 or subsequent\n\nCisco Catalyst Blade Switch 3120G and Cisco Catalyst Blade Switch 3120X for HP\n 12.2(50) SE1 or subsequent\n\nTo Locate the Firmware Update\n\nBrowse to http://www.hp.com and do the following:\n\nSelect \"Support & Drivers\"\nIn Step 1 select \"Download drivers and software (and firmware)\"\nIn Step 2 enter \"Cisco Catalyst Blade Switch\"\nClick on \"Go\"\nSelect the desired product\nSelect the desired Windows operating system\nClick on \"Firmware - Blade Infrastructure\"\n\nPRODUCT SPECIFIC INFORMATION\nNone\n\nHISTORY\nVersion:1 (rev.1) - 17 November 2009 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n  To: security-alert@hp.com\n  Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n    -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n    -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber's choice for Business: sign-in. \nOn the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing & Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2009 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAksEDAMACgkQ4B86/C0qfVm87gCgliWdpIKldzOKHRvJA5r9gR4Z\nge0AoMu3ueCbIB4y3HUmT/jReUzE4jym\n=uBei\n-----END PGP SIGNATURE-----\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "BID",
            id: "31545",
         },
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            db: "PACKETSTORM",
            id: "81054",
         },
         {
            db: "PACKETSTORM",
            id: "82772",
         },
      ],
      trust: 2.97,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-34734",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2008-4609",
            trust: 3,
         },
         {
            db: "USCERT",
            id: "TA09-251A",
            trust: 2.6,
         },
         {
            db: "CERT/CC",
            id: "VU#723308",
            trust: 2,
         },
         {
            db: "BID",
            id: "31545",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "36597",
            trust: 0.9,
         },
         {
            db: "VUPEN",
            id: "ADV-2009-2954",
            trust: 0.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2009-2567",
            trust: 0.8,
         },
         {
            db: "SECUNIA",
            id: "36802",
            trust: 0.8,
         },
         {
            db: "SECUNIA",
            id: "36602",
            trust: 0.8,
         },
         {
            db: "SECUNIA",
            id: "36603",
            trust: 0.8,
         },
         {
            db: "SECUNIA",
            id: "37044",
            trust: 0.8,
         },
         {
            db: "USCERT",
            id: "SA09-251A",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "82772",
            trust: 0.2,
         },
         {
            db: "VULHUB",
            id: "VHN-34734",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2008-4609",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "81054",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            db: "BID",
            id: "31545",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "PACKETSTORM",
            id: "81054",
         },
         {
            db: "PACKETSTORM",
            id: "82772",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   id: "VAR-200810-0010",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
      ],
      trust: 0.8899559444444445,
   },
   last_update_date: "2024-07-23T21:21:00.936000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "sk42723",
            trust: 0.8,
            url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk42723",
         },
         {
            title: "cisco-sa-20090908-tcp24",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml",
         },
         {
            title: "20091009",
            trust: 0.8,
            url: "http://www.furukawa.co.jp/fitelnet/topic/vulnera_20091009.html",
         },
         {
            title: "MS09-048",
            trust: 0.8,
            url: "http://www.microsoft.com/technet/security/bulletin/ms09-048.mspx",
         },
         {
            title: "NV09-014",
            trust: 0.8,
            url: "http://www.nec.co.jp/security-info/secinfo/nv09-014.html",
         },
         {
            title: "Text Form of Oracle Critical Patch Update - July 2012 Risk Matrices",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2012verbose-392736.html",
         },
         {
            title: "Oracle Critical Patch Update Advisory - July 2012",
            trust: 0.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
         },
         {
            title: "TCPの実装におけるサービス運用妨害(DoS)の脆弱性について",
            trust: 0.8,
            url: "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu943657.html",
         },
         {
            title: "SA41",
            trust: 0.8,
            url: "https://kb.bluecoat.com/index?page=content&id=sa41",
         },
         {
            title: "July 2012 Critical Patch Update Released",
            trust: 0.8,
            url: "https://blogs.oracle.com/security/entry/july_2012_critical_patch_update",
         },
         {
            title: "TCPセッション処理に関する脆弱性",
            trust: 0.8,
            url: "http://www.seil.jp/seilseries/security/2009/a00667.php",
         },
         {
            title: "267088",
            trust: 0.8,
            url: "http://jp.sunsolve.sun.com/search/document.do?assetkey=1-66-267088-1",
         },
         {
            title: "MS09-048",
            trust: 0.8,
            url: "http://www.microsoft.com/japan/technet/security/bulletin/ms09-048.mspx",
         },
         {
            title: "MS09-048e",
            trust: 0.8,
            url: "http://www.microsoft.com/japan/security/bulletins/ms09-048e.mspx",
         },
         {
            title: "JVNVU#943657",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/vu943657.html",
         },
         {
            title: "TA09-251A",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/ta09-251a.html",
         },
         {
            title: "Symantec Security Advisories: SA38: Blue Coat ProxyAV Advisory on Sockstress TCP Attacks",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=fb80a5c8f4ca8d75f9df074d6d82e182",
         },
         {
            title: "Cisco: TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20090908-tcp24",
         },
         {
            title: "Symantec Security Advisories: SA41 : Blue Coat ProxySG Advisory on Sockstress TCP Attacks (CVE-2008-4609)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=d8370cc1d406e0cbe214c88e6d3d62d7",
         },
         {
            title: "Symantec Security Advisories: SA34 : Blue Coat iShared Advisory on Sockstress TCP Attacks (CVE-2008-4609)",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=85b57218eec77ee0396becd56404d8f1",
         },
         {
            title: "Symantec Security Advisories: SA35 : Blue Coat Director Advisory on Sockstress TCP Attacks",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=7d4c01e5a8411a8e49f47e52a356544c",
         },
         {
            title: "Symantec Security Advisories: SA39 : Blue Coat PacketShaper Advisory on Sockstress TCP Attacks",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=1ace87e00398301b8248ba77512ee922",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2008-4609 ",
         },
         {
            title: "sockstress",
            trust: 0.1,
            url: "https://github.com/marcelki/sockstress ",
         },
         {
            title: "awesome-network-stuff",
            trust: 0.1,
            url: "https://github.com/alphaseclab/awesome-network-stuff ",
         },
         {
            title: "awesome-network-stuff",
            trust: 0.1,
            url: "https://github.com/aniksarakash/awesome-network-stuff ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/cvedb/poc-list ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-16",
            trust: 1.9,
         },
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "CWE-noinfo",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.7,
            url: "https://www.cert.fi/haavoittuvuudet/2008/tcp-vulnerabilities.html",
         },
         {
            trust: 2.6,
            url: "http://www.cpni.gov.uk/docs/tn-03-09-security-assessment-tcp.pdf",
         },
         {
            trust: 2.6,
            url: "http://www.us-cert.gov/cas/techalerts/ta09-251a.html",
         },
         {
            trust: 2.1,
            url: "http://blog.robertlee.name/2008/10/conjecture-speculation.html",
         },
         {
            trust: 1.8,
            url: "http://www.cisco.com/en/us/products/products_security_response09186a0080a15120.html",
         },
         {
            trust: 1.8,
            url: "http://www.cisco.com/en/us/products/products_security_advisory09186a0080af511d.shtml",
         },
         {
            trust: 1.8,
            url: "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
         },
         {
            trust: 1.8,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150",
         },
         {
            trust: 1.8,
            url: "http://insecure.org/stf/tcp-dos-attack-explained.html",
         },
         {
            trust: 1.8,
            url: "http://searchsecurity.techtarget.com.au/articles/27154-tcp-is-fundamentally-borked",
         },
         {
            trust: 1.8,
            url: "http://www.outpost24.com/news/news-2008-10-02.html",
         },
         {
            trust: 1.8,
            url: "http://lists.immunitysec.com/pipermail/dailydave/2008-october/005360.html",
         },
         {
            trust: 1.8,
            url: "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-048",
         },
         {
            trust: 1.8,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6340",
         },
         {
            trust: 1.7,
            url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2",
         },
         {
            trust: 1.6,
            url: "http://tools.ietf.org/html/draft-ananth-tcpm-persist-01",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/archive/1/507953",
         },
         {
            trust: 1.2,
            url: "http://www.microsoft.com/technet/security/bulletin/ms09-048.mspx",
         },
         {
            trust: 1.2,
            url: "http://www.kb.cert.org/vuls/id/723308",
         },
         {
            trust: 1.1,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-267088-1",
         },
         {
            trust: 0.8,
            url: "http://tools.ietf.org/html/rfc1122#page-92",
         },
         {
            trust: 0.8,
            url: "http://tools.ietf.org/html/draft-mahesh-persist-timeout-02",
         },
         {
            trust: 0.8,
            url: "http://shlang.com/netkill/",
         },
         {
            trust: 0.8,
            url: "http://www.netasq.com/en/threats/sockstress.php",
         },
         {
            trust: 0.8,
            url: "http://www.phrack.org/issues.html?issue=66&id=9#article",
         },
         {
            trust: 0.8,
            url: "http://isc.sans.org/diary.html?storyid=5104",
         },
         {
            trust: 0.8,
            url: "http://www.t2.fi/2008/08/27/jack-c-louis-and-robert-e-lee-to-talk-about-new-dos-attack-vectors/",
         },
         {
            trust: 0.8,
            url: "http://www.darkreading.com/blog.asp?blog_sectionid=403&doc_id=164939&wt.svl=tease2_2",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg04040.html",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg03826.html",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg03503.html",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg02870.html",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg02557.html",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/mail-archive/web/tcpm/current/msg02189.html",
         },
         {
            trust: 0.8,
            url: "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git;a=blob;f=net/ipv4/tcp_timer.c;h=b144a26359bcf34a4b0606e171f97dc709afdfbb;hb=120f68c426e746771e8c09736c0f753822ff3f52#l233",
         },
         {
            trust: 0.8,
            url: "http://sla.ckers.org/forum/read.php?14,27324",
         },
         {
            trust: 0.8,
            url: "http://www.checkpoint.com/defense/advisories/public/announcement/090809-tcpip-dos-sockstress.html",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/archive/1/archive/1/506331/100/0/",
         },
         {
            trust: 0.8,
            url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk42725",
         },
         {
            trust: 0.8,
            url: "http://kbase.redhat.com/faq/docs/doc-21623",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4609",
         },
         {
            trust: 0.8,
            url: "http://www.cpni.gov.uk/products/technicalnotes/feb-09-security-assessment-tcp.aspx",
         },
         {
            trust: 0.8,
            url: "http://tools.ietf.org/html/rfc793",
         },
         {
            trust: 0.8,
            url: "http://www.ipa.go.jp/security/vuln/vuln_tcpip.html",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/at/2009/at090019.txt",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/at/2009/at090018.txt",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu943657/index.html",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnta09-251a/",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/tr/jvntr-2009-22",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4609",
         },
         {
            trust: 0.8,
            url: "http://secunia.com/advisories/36802",
         },
         {
            trust: 0.8,
            url: "http://secunia.com/advisories/37044/",
         },
         {
            trust: 0.8,
            url: "http://secunia.com/advisories/36597",
         },
         {
            trust: 0.8,
            url: "http://secunia.com/advisories/36603",
         },
         {
            trust: 0.8,
            url: "http://secunia.com/advisories/36602",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/31545",
         },
         {
            trust: 0.8,
            url: "http://www.us-cert.gov/cas/alerts/sa09-251a.html",
         },
         {
            trust: 0.8,
            url: "http://www.vupen.com/english/advisories/2009/2567",
         },
         {
            trust: 0.8,
            url: "http://www.vupen.com/english/advisories/2009/2954",
         },
         {
            trust: 0.8,
            url: "http://www.cyberpolice.go.jp/#topics",
         },
         {
            trust: 0.3,
            url: "http://blogs.technet.com/srd/archive/2009/09/08/assessing-the-risk-of-the-september-critical-security-bulletins.aspx",
         },
         {
            trust: 0.3,
            url: "http://blogs.technet.com/srd/archive/2009/09/08/ms09-048-tcp-ip-vulnerabilities.aspx",
         },
         {
            trust: 0.3,
            url: "/archive/1/504375",
         },
         {
            trust: 0.3,
            url: "http://support.nortel.com/go/main.jsp?cscat=bltndetail&documentoid=971633&poid=",
         },
         {
            trust: 0.3,
            url: "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu943657.html",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/css/p8/documents/100065311",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/css/p8/documents/100065799",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20081017-tcp.shtml",
         },
         {
            trust: 0.3,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=kb66963",
         },
         {
            trust: 0.3,
            url: "http://support.citrix.com/article/ctx123649",
         },
         {
            trust: 0.3,
            url: "http://www11.itrc.hp.com/service/cki/docdisplay.do?doclocale=en&docid=emr_na-c01923093-1",
         },
         {
            trust: 0.3,
            url: "http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=962027",
         },
         {
            trust: 0.3,
            url: "https://kb.bluecoat.com/index?page=content&id=sa36",
         },
         {
            trust: 0.3,
            url: "https://kb.bluecoat.com/index?page=content&id=sa37",
         },
         {
            trust: 0.3,
            url: "https://kb.bluecoat.com/index?page=content&id=sa35",
         },
         {
            trust: 0.3,
            url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk42723",
         },
         {
            trust: 0.3,
            url: "https://support.f5.com/kb/en-us/solutions/public/10000/500/sol10509.html",
         },
         {
            trust: 0.3,
            url: "http://www.stonesoft.com/en/support/security_advisories/2009_17_09.html",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=125856010926699&w=2",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/16.html",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2008-4609",
         },
         {
            trust: 0.1,
            url: "https://github.com/marcelki/sockstress",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20090908-tcp24",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/secunia_security_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/business_solutions/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/36597/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/about_secunia_advisories/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-4609",
         },
         {
            trust: 0.1,
            url: "http://www.itrc.hp.com/service/cki/secbullarchive.do",
         },
         {
            trust: 0.1,
            url: "http://www.hp.com",
         },
         {
            trust: 0.1,
            url: "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na&langcode=useng&jumpid=in_sc-gen__driveritrc&topiccode=itrc",
         },
         {
            trust: 0.1,
            url: "http://h30046.www3.hp.com/subsignin.php",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            db: "BID",
            id: "31545",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "PACKETSTORM",
            id: "81054",
         },
         {
            db: "PACKETSTORM",
            id: "82772",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            db: "BID",
            id: "31545",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            db: "PACKETSTORM",
            id: "81054",
         },
         {
            db: "PACKETSTORM",
            id: "82772",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2009-11-23T00:00:00",
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            date: "2008-10-20T00:00:00",
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            date: "2008-10-20T00:00:00",
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            date: "2008-10-02T00:00:00",
            db: "BID",
            id: "31545",
         },
         {
            date: "2009-10-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            date: "2009-09-09T16:34:28",
            db: "PACKETSTORM",
            id: "81054",
         },
         {
            date: "2009-11-18T16:25:02",
            db: "PACKETSTORM",
            id: "82772",
         },
         {
            date: "2008-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            date: "2008-10-20T17:59:26.163000",
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2013-02-13T00:00:00",
            db: "CERT/CC",
            id: "VU#723308",
         },
         {
            date: "2022-12-14T00:00:00",
            db: "VULHUB",
            id: "VHN-34734",
         },
         {
            date: "2022-12-14T00:00:00",
            db: "VULMON",
            id: "CVE-2008-4609",
         },
         {
            date: "2012-07-30T20:21:00",
            db: "BID",
            id: "31545",
         },
         {
            date: "2012-07-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2009-002090",
         },
         {
            date: "2019-05-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
         {
            date: "2022-12-14T16:40:36.253000",
            db: "NVD",
            id: "CVE-2008-4609",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "TCP may keep its offered receive window closed indefinitely (RFC 1122)",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#723308",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "configuration error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200810-307",
         },
      ],
      trust: 0.6,
   },
}

var-200609-0178
Vulnerability from variot

The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to cause a denial of service by sending a VTP version 1 summary frame with a VTP version field value of 2. This vulnerability may allow a remote, unauthenticated attacker to cause a denial-of-service condition. This vulnerability may allow a remote, unauthenticated attacker to cause a denial-of-service condition. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. These issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. Attackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. By exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. Cisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. From this point on the switch cannot communicate with the changed VLAN configuration, as all other switches will reject the generated update, 3 VLAN name heap overflow If an attacker is able to send VTP updates to the Cisco IOS device, type 2 frames contain record of. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name. If the updated VLAN name is larger than 100 bytes and the VLAN name length field is correct, it will cause a heap overflow and execute arbitrary code on the receiving switch.


Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.

Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/


TITLE: Cisco IOS VTP Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA21896

VERIFY ADVISORY: http://secunia.com/advisories/21896/

CRITICAL: Moderately critical

IMPACT: Manipulation of data, DoS, System access

WHERE:

From local network

OPERATING SYSTEM: Cisco IOS 10.x http://secunia.com/product/184/ Cisco IOS 11.x http://secunia.com/product/183/ Cisco IOS 12.x http://secunia.com/product/182/ Cisco IOS R11.x http://secunia.com/product/53/ Cisco IOS R12.x http://secunia.com/product/50/

DESCRIPTION: FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. This can be exploited to reset the switch with a Software Forced Crash Exception by sending a specially crafted packet to a trunk enabled port.

2) An integer overflow error exists in the VTP configuration revision handling.

3) A boundary error exists in the processing of VTP summary advertisement messages. This can be exploited to cause a heap-based buffer overflow by sending a specially crafted message containing an overly long VLAN name (more than 100 characters) to a trunk enabled port.

NOTE: The packets must be received with a matching domain name and a matching VTP domain password (if configured).

SOLUTION: A fix is reportedly available for vulnerability #1. The vendor also recommends applying a VTP domain password to the VTP domain (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: FX, Phenoelit.

ORIGINAL ADVISORY: Phenoelit: http://www.phenoelit.de/stuff/CiscoVTP.txt

Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0178",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 3.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.1\\(19\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(19)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "catos",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FX fx@phenoelit.de",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2006-4774",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2006-4774",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-20882",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2006-4774",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#821420",
                  trust: 1.6,
                  value: "12.40",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#542108",
                  trust: 0.8,
                  value: "22.74",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#175148",
                  trust: 0.8,
                  value: "3.37",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200609-225",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-20882",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to cause a denial of service by sending a VTP version 1 summary frame with a VTP version field value of 2.   This vulnerability may allow a remote, unauthenticated attacker to cause a denial-of-service condition.   This vulnerability may allow a remote, unauthenticated attacker to cause a denial-of-service condition. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. \nThese issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. \nAttackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. \nBy exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. \nCisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. From this point on the switch cannot communicate with the changed VLAN configuration, as all other switches will reject the generated update, 3 VLAN name heap overflow If an attacker is able to send VTP updates to the Cisco IOS device, type 2 frames contain record of. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name. If the updated VLAN name is larger than 100 bytes and the VLAN name length field is correct, it will cause a heap overflow and execute arbitrary code on the receiving switch. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco IOS VTP Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA21896\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21896/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nManipulation of data, DoS, System access\n\nWHERE:\n>From local network\n\nOPERATING SYSTEM:\nCisco IOS 10.x\nhttp://secunia.com/product/184/\nCisco IOS 11.x\nhttp://secunia.com/product/183/\nCisco IOS 12.x\nhttp://secunia.com/product/182/\nCisco IOS R11.x\nhttp://secunia.com/product/53/\nCisco IOS R12.x\nhttp://secunia.com/product/50/\n\nDESCRIPTION:\nFX has reported some vulnerabilities in Cisco IOS, which can be\nexploited by malicious people to cause a DoS (Denial of Service) and\npotentially to compromise a vulnerable network device. This can be exploited to reset the switch\nwith a Software Forced Crash Exception by sending a specially crafted\npacket to a trunk enabled port. \n\n2) An integer overflow error exists in the VTP configuration revision\nhandling. \n\n3) A boundary error exists in the processing of VTP summary\nadvertisement messages. This can be exploited to cause a heap-based\nbuffer overflow by sending a specially crafted message containing an\noverly long VLAN name (more than 100 characters) to a trunk enabled\nport. \n\nNOTE: The packets must be received with a matching domain name and a\nmatching VTP domain password (if configured). \n\nSOLUTION:\nA fix is reportedly available for vulnerability #1. The vendor also\nrecommends applying a VTP domain password to the VTP domain (see the\nvendor's advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nFX, Phenoelit. \n\nORIGINAL ADVISORY:\nPhenoelit:\nhttp://www.phenoelit.de/stuff/CiscoVTP.txt\n\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
      ],
      trust: 5.04,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SECUNIA",
            id: "21896",
            trust: 5,
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
            trust: 4.1,
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
            trust: 4.1,
         },
         {
            db: "BID",
            id: "19998",
            trust: 2.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2006-3600",
            trust: 1.7,
         },
         {
            db: "OSVDB",
            id: "28775",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1016843",
            trust: 1.7,
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
            trust: 1.6,
         },
         {
            db: "SECUNIA",
            id: "21902",
            trust: 0.9,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
            trust: 0.7,
         },
         {
            db: "BUGTRAQ",
            id: "20060913 RE: CISCO IOS VTP ISSUES",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20060913 CISCO IOS VTP ISSUES",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20060913 CISCO VLAN TRUNKING PROTOCOL VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "28924",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-20882",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "50047",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "50048",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   id: "VAR-200609-0178",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:10:33.166000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sr-20060913-vtp",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 5.4,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
         },
         {
            trust: 3.4,
            url: "http://secunia.com/advisories/21896/",
         },
         {
            trust: 3.2,
            url: "http://www.phenoelit.de/stuff/ciscovtp.txt ",
         },
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/19998",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/821420",
         },
         {
            trust: 2.4,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4774",
         },
         {
            trust: 1.8,
            url: "http://www.phenoelit.de/stuff/ciscovtp.txt",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/28775",
         },
         {
            trust: 1.7,
            url: "http://securitytracker.com/id?1016843",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/21896",
         },
         {
            trust: 1.6,
            url: "http://www.cisco.com/en/us/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml#wp998892",
         },
         {
            trust: 1.4,
            url: "http://www.frsirt.com/english/advisories/2006/3600",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2006/3600",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28924",
         },
         {
            trust: 0.9,
            url: "http://secunia.com/advisories/21902/",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4774",
         },
         {
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/542108",
         },
         {
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/175148",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/445938/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/445896/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/28924",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/public/sw-center/sw-ios.shtml",
         },
         {
            trust: 0.3,
            url: "/archive/1/445896",
         },
         {
            trust: 0.3,
            url: "/archive/1/445938",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/quality_assurance_analyst/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/hardcore_disassembler_and_reverse_engineer/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/web_application_security_specialist/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/184/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/53/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/182/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/183/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/527/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/3564/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/185/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/526/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            date: "2006-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            date: "2006-09-14T00:00:00",
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            date: "2006-09-13T00:00:00",
            db: "BID",
            id: "19998",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            date: "2006-09-14T22:28:53",
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            date: "2006-09-14T22:28:53",
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            date: "2006-09-14T00:07:00",
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            date: "2006-09-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            date: "2006-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            date: "2018-10-17T00:00:00",
            db: "VULHUB",
            id: "VHN-20882",
         },
         {
            date: "2006-09-14T18:47:00",
            db: "BID",
            id: "19998",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2006-000551",
         },
         {
            date: "2018-10-17T21:39:30.090000",
            db: "NVD",
            id: "CVE-2006-4774",
         },
         {
            date: "2006-09-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS fails to properly handle summary packets in the VLAN Trunking Protocol",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
         },
      ],
      trust: 1.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-225",
         },
      ],
      trust: 0.6,
   },
}

var-200212-0791
Vulnerability from variot

Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing. Catalyst is a commercial-grade switch distributed by Cisco. Under normal circumstances, a switch will learn the MAC address of a system connected to a port after one packet. It has been reported that the switch may not learn the MAC of a connected system until several more packets have been sent to the unknown host. By doing so, unicast traffic between two systems across the switch may be broadcast to all systems connected to the switch. Remote attackers can obtain sensitive network information through sniffing

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200212-0791",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.3\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.1\\(2\\)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5.5",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Vulnerability discovery credited to TROY COULOMBE <TROCOU@SAFECO.com>.",
      sources: [
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2002-2316",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-6699",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2002-2316",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200212-305",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-6699",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-6699",
         },
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing. Catalyst is a commercial-grade switch distributed by Cisco. \nUnder normal circumstances, a switch will learn the MAC address of a system connected to a port after one packet.  It has been reported that the switch may not learn the MAC of a connected system until several more packets have been sent to the unknown host.  By doing so, unicast traffic between two systems across the switch may be broadcast to all systems connected to the switch. Remote attackers can obtain sensitive network information through sniffing",
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "VULHUB",
            id: "VHN-6699",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "4790",
            trust: 2,
         },
         {
            db: "NVD",
            id: "CVE-2002-2316",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "9148",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20020520 CATALYST 4000",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20020618 RE: CATALYST 4000 - CISCO'S RESPONSE",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-6699",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-6699",
         },
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   id: "VAR-200212-0791",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-6699",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T13:16:15.361000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/4790",
         },
         {
            trust: 1.7,
            url: "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html",
         },
         {
            trust: 1.7,
            url: "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html",
         },
         {
            trust: 1.7,
            url: "http://www.iss.net/security_center/static/9148.php",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-6699",
         },
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-6699",
         },
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2002-12-31T00:00:00",
            db: "VULHUB",
            id: "VHN-6699",
         },
         {
            date: "2002-05-21T00:00:00",
            db: "BID",
            id: "4790",
         },
         {
            date: "2002-12-31T05:00:00",
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            date: "2002-12-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-09-05T00:00:00",
            db: "VULHUB",
            id: "VHN-6699",
         },
         {
            date: "2002-05-21T00:00:00",
            db: "BID",
            id: "4790",
         },
         {
            date: "2008-09-05T20:32:54.413000",
            db: "NVD",
            id: "CVE-2002-2316",
         },
         {
            date: "2002-12-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst Unicast Traffic Broadcast Vulnerability",
      sources: [
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
      trust: 0.9,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "4790",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200212-305",
         },
      ],
      trust: 0.9,
   },
}

var-200406-0087
Vulnerability from variot

It has been reported that Cisco CatOS is vulnerable to a denial of service attack. Improper initial TCP handshakes can cause affected devices to cease functioning and reboot. These improper connections can originate from spoofed source addresses, making it easier for an attacker to accomplish a denial of service attack. This vulnerability is only accessible if the device is running telnet, HTTP, or SSH services. IOS is not affected by this vulnerability.

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200406-0087",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 3.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "catalyst csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "60005.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "4.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "50006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40005.1",
         },
         {
            model: "catos glx",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50005.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catos clr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(9)",
         },
         {
            model: "catos cv",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(19)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(18)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16.2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(15)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(14)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13.5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(2)",
         },
         {
            model: "catos deferred",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)-",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(14)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(1)",
         },
         {
            model: "catos gdr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(8)-",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3(4)",
         },
         {
            model: "catalyst pan",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.111)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.110)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(2.13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.3(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(8)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(11)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "catalyst 4912g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 4510r",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 4507r",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4506",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4503",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(8)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst 2948g-l3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2948g-ge-tx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2948g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2948",
         },
         {
            model: "catalyst 2926t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2926gs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2926gl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2926f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2926",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2902",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2901",
         },
         {
            model: "catalyst 2980g-a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2980g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos glx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(9)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(20)",
         },
         {
            model: "catalyst 8540msr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 8540csr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 8510msr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 8510csr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8500",
         },
         {
            model: "catalyst 4908g-l3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 4840g",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4800",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4232-13",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4232",
         },
         {
            model: "catalyst access gateway switch",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4224",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4200",
         },
         {
            model: "catalyst metro",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3750",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3750",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3560",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3550",
         },
         {
            model: "catalyst xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3500",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2970",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2955",
         },
         {
            model: "catalyst lre",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2950",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2950",
         },
         {
            model: "catalyst 2948g-l3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2940",
         },
         {
            model: "catalyst xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst lre xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "28209.00.07",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2820",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "19009.00.07",
         },
         {
            model: "catalyst",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor disclosed this vulnerability.",
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
      trust: 0.3,
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "It has been reported that Cisco CatOS is vulnerable to a denial of service attack. Improper initial TCP handshakes can cause affected devices to cease functioning and reboot.\nThese improper connections can originate from spoofed source addresses, making it easier for an attacker to accomplish a denial of service attack.\nThis vulnerability is only accessible if the device is running telnet, HTTP, or SSH services. IOS is not affected by this vulnerability.",
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
      trust: 0.3,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "10504",
            trust: 0.3,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
   },
   id: "VAR-200406-0087",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.35529557,
   },
   last_update_date: "2022-05-17T01:42:51.422000Z",
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 0.3,
            url: "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "BID",
            id: "10504",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-06-09T00:00:00",
            db: "BID",
            id: "10504",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-06-09T00:00:00",
            db: "BID",
            id: "10504",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco CatOS TCP-ACK Denial Of Service Vulnerability",
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
      trust: 0.3,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Failure to Handle Exceptional Conditions",
      sources: [
         {
            db: "BID",
            id: "10504",
         },
      ],
      trust: 0.3,
   },
}

var-200210-0102
Vulnerability from variot

Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. IOS is an Internet operating system distributed by CISCO and used on CISCO routers. When processing very large packets, the SSH process consumes most of the CPU instruction cycles, causing it to stop responding to normal communication, resulting in a denial of service. In some cases, it may cause the CISCO equipment to restart. The problem lies in deattack.c, because a 16-bit unsigned variable is mistakenly used as a 32-bit variable in the detect_attack() function, resulting in a table index overflow problem and a denial of service attack. For details, please refer to SSH1 daemon crc32 compensation attack detection security vulnerability ( http://security.nsfocus.com/showQuery.asp?bugID=1262 ). TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to majordomo@iss.net Contact alert-owner@iss.net for help with any problems!


-----BEGIN PGP SIGNED MESSAGE-----

ISS X-Force has received reports that some individuals were unable to verify the PGP signature on the Security Alert Summary distributed earlier in the week. Due to this issue, X-Force is re-distributing the Security Alert Summary. We apologize for any inconvience this may have caused.

Internet Security Systems Security Alert Summary March 5, 2001 Volume 6 Number 4

X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php

This summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php


Contents

90 Reported Vulnerabilities

Risk Factor Key


Date Reported: 2/27/01 Vulnerability: a1-server-dos Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server denial of service X-Force URL: http://xforce.iss.net/static/6161.php


Date Reported: 2/27/01 Vulnerability: a1-server-directory-traversal Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server directory traversal X-Force URL: http://xforce.iss.net/static/6162.php


Date Reported: 2/27/01 Vulnerability: webreflex-web-server-dos Platforms Affected: WebReflex Risk Factor: Medium Attack Type: Network Based Brief Description: WebReflex Web server denial of service X-Force URL: http://xforce.iss.net/static/6163.php


Date Reported: 2/26/01 Vulnerability: sudo-bo-elevate-privileges Platforms Affected: Sudo Risk Factor: Medium Attack Type: Host Based Brief Description: Sudo buffer overflow could allow elevated user privileges X-Force URL: http://xforce.iss.net/static/6153.php


Date Reported: 2/26/01 Vulnerability: mygetright-skin-overwrite-file Platforms Affected: My GetRight Risk Factor: High Attack Type: Network Based Brief Description: My GetRight 'skin' allows remote attacker to overwrite existing files X-Force URL: http://xforce.iss.net/static/6155.php


Date Reported: 2/26/01 Vulnerability: mygetright-directory-traversal Platforms Affected: My GetRight Risk Factor: Medium Attack Type: Network Based Brief Description: My GetRight directory traversal X-Force URL: http://xforce.iss.net/static/6156.php


Date Reported: 2/26/01 Vulnerability: win2k-event-viewer-bo Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Host Based Brief Description: Windows 2000 event viewer buffer overflow X-Force URL: http://xforce.iss.net/static/6160.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-cpu-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra CPU denial of service X-Force URL: http://xforce.iss.net/static/6159.php


Date Reported: 2/26/01 Vulnerability: netscape-collabra-kernel-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra Server kernel denial of service X-Force URL: http://xforce.iss.net/static/6158.php


Date Reported: 2/23/01 Vulnerability: mercur-expn-bo Platforms Affected: MERCUR Risk Factor: High Attack Type: Network Based Brief Description: MERCUR Mailserver EXPN buffer overflow X-Force URL: http://xforce.iss.net/static/6149.php


Date Reported: 2/23/01 Vulnerability: sedum-http-dos Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP server denial of service X-Force URL: http://xforce.iss.net/static/6152.php


Date Reported: 2/23/01 Vulnerability: tru64-inetd-dos Platforms Affected: Tru64 Risk Factor: Medium Attack Type: Host Based Brief Description: Tru64 UNIX inetd denial of service X-Force URL: http://xforce.iss.net/static/6157.php


Date Reported: 2/22/01 Vulnerability: outlook-vcard-bo Platforms Affected: Microsoft Outlook Risk Factor: High Attack Type: Host Based Brief Description: Outlook and Outlook Express vCards buffer overflow X-Force URL: http://xforce.iss.net/static/6145.php


Date Reported: 2/22/01 Vulnerability: ultimatebb-cookie-member-number Platforms Affected: Ultimate Bulletin Board Risk Factor: High Attack Type: Network Based Brief Description: Ultimate Bulletin Board cookie allows attacker to change member number X-Force URL: http://xforce.iss.net/static/6144.php


Date Reported: 2/21/01 Vulnerability: ultimatebb-cookie-gain-privileges Platforms Affected: Ultimate Bulletin Board Risk Factor: Medium Attack Type: Network Based Brief Description: Ultimate Bulletin Board allows remote attacker to obtain cookie information X-Force URL: http://xforce.iss.net/static/6142.php


Date Reported: 2/21/01 Vulnerability: sendmail-elevate-privileges Platforms Affected: Sendmail Risk Factor: High Attack Type: Host Based Brief Description: Sendmail -bt command could allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6147.php


Date Reported: 2/21/01 Vulnerability: jre-jdk-execute-commands Platforms Affected: JRE/JDK Risk Factor: High Attack Type: Host Based Brief Description: JRE/JDK could allow unauthorized execution of commands X-Force URL: http://xforce.iss.net/static/6143.php


Date Reported: 2/20/01 Vulnerability: licq-remote-port-dos Platforms Affected: LICQ Risk Factor: Medium Attack Type: Network Based Brief Description: LICQ remote denial of service X-Force URL: http://xforce.iss.net/static/6134.php


Date Reported: 2/20/01 Vulnerability: pgp4pine-expired-keys Platforms Affected: pgp4pine Risk Factor: Medium Attack Type: Host Based Brief Description: pgp4pine may transmit messages using expired public keys X-Force URL: http://xforce.iss.net/static/6135.php


Date Reported: 2/20/01 Vulnerability: chilisoft-asp-view-files Platforms Affected: Chili!Soft ASP Risk Factor: High Attack Type: Network Based Brief Description: Chili!Soft ASP allows remote attackers to gain access to sensitive information X-Force URL: http://xforce.iss.net/static/6137.php


Date Reported: 2/20/01 Vulnerability: win2k-domain-controller-dos Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Network/Host Based Brief Description: Windows 2000 domain controller denial of service X-Force URL: http://xforce.iss.net/static/6136.php


Date Reported: 2/19/01 Vulnerability: asx-remote-dos Platforms Affected: ASX Switches Risk Factor: Medium Attack Type: Network Based Brief Description: ASX switches allow remote denial of service X-Force URL: http://xforce.iss.net/static/6133.php


Date Reported: 2/18/01 Vulnerability: http-cgi-mailnews-username Platforms Affected: Mailnews.cgi Risk Factor: High Attack Type: Network Based Brief Description: Mailnews.cgi allows remote attacker to execute shell commands using username X-Force URL: http://xforce.iss.net/static/6139.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-reveal-path Platforms Affected: BadBlue Risk Factor: Low Attack Type: Network Based Brief Description: BadBlue ext.dll library reveals path X-Force URL: http://xforce.iss.net/static/6130.php


Date Reported: 2/17/01 Vulnerability: badblue-ext-dos Platforms Affected: BadBlue Risk Factor: Medium Attack Type: Network Based Brief Description: BadBlue ext.dll library denial of service X-Force URL: http://xforce.iss.net/static/6131.php


Date Reported: 2/17/01 Vulnerability: moby-netsuite-bo Platforms Affected: Moby's NetSuite Risk Factor: Medium Attack Type: Network Based Brief Description: Moby's NetSuite Web server buffer overflow X-Force URL: http://xforce.iss.net/static/6132.php


Date Reported: 2/16/01 Vulnerability: webactive-directory-traversal Platforms Affected: WEBactive Risk Factor: Medium Attack Type: Network/Host Based Brief Description: WEBactive HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6121.php


Date Reported: 2/16/01 Vulnerability: esone-cgi-directory-traversal Platforms Affected: ES.One store.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Thinking Arts ES.One store.cgi directory traversal X-Force URL: http://xforce.iss.net/static/6124.php


Date Reported: 2/16/01 Vulnerability: vshell-username-bo Platforms Affected: VShell Risk Factor: High Attack Type: Network Based Brief Description: VShell username buffer overflow X-Force URL: http://xforce.iss.net/static/6146.php


Date Reported: 2/16/01 Vulnerability: vshell-port-forwarding-rule Platforms Affected: VShell Risk Factor: Medium Attack Type: Network/Host Based Brief Description: VShell uses weak port forwarding rule X-Force URL: http://xforce.iss.net/static/6148.php


Date Reported: 2/15/01 Vulnerability: pi3web-isapi-bo Platforms Affected: Pi3Web Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Pi3Web ISAPI tstisapi.dll denial of service X-Force URL: http://xforce.iss.net/static/6113.php


Date Reported: 2/15/01 Vulnerability: pi3web-reveal-path Platforms Affected: Pi3Web Risk Factor: Low Attack Type: Network Based Brief Description: Pi3Web reveals physical path of server X-Force URL: http://xforce.iss.net/static/6114.php


Date Reported: 2/15/01 Vulnerability: bajie-execute-shell Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer execute shell commands X-Force URL: http://xforce.iss.net/static/6117.php


Date Reported: 2/15/01 Vulnerability: bajie-directory-traversal Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer directory traversal X-Force URL: http://xforce.iss.net/static/6115.php


Date Reported: 2/15/01 Vulnerability: resin-directory-traversal Platforms Affected: Resin Risk Factor: Medium Attack Type: Network Based Brief Description: Resin Web server directory traversal X-Force URL: http://xforce.iss.net/static/6118.php


Date Reported: 2/15/01 Vulnerability: netware-mitm-recover-passwords Platforms Affected: Netware Risk Factor: Low Attack Type: Network Based Brief Description: Netware "man in the middle" attack password recovery X-Force URL: http://xforce.iss.net/static/6116.php


Date Reported: 2/14/01 Vulnerability: firebox-pptp-dos Platforms Affected: WatchGuard Firebox II Risk Factor: High Attack Type: Network Based Brief Description: WatchGuard Firebox II PPTP denial of service X-Force URL: http://xforce.iss.net/static/6109.php


Date Reported: 2/14/01 Vulnerability: hp-virtualvault-iws-dos Platforms Affected: HP VirtualVault Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HP VirtualVault iPlanet Web Server denial of service X-Force URL: http://xforce.iss.net/static/6110.php


Date Reported: 2/14/01 Vulnerability: kicq-execute-commands Platforms Affected: KICQ Risk Factor: High Attack Type: Network Based Brief Description: kicq could allow remote execution of commands X-Force URL: http://xforce.iss.net/static/6112.php


Date Reported: 2/14/01 Vulnerability: hp-text-editor-bo Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP Text editors buffer overflow X-Force URL: http://xforce.iss.net/static/6111.php


Date Reported: 2/13/01 Vulnerability: sendtemp-pl-read-files Platforms Affected: sendtemp.pl Risk Factor: Medium Attack Type: Network/Host Based Brief Description: sendtemp.pl could allow an attacker to read files on the server X-Force URL: http://xforce.iss.net/static/6104.php


Date Reported: 2/13/01 Vulnerability: analog-alias-bo Platforms Affected: Analog ALIAS Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Analog ALIAS command buffer overflow X-Force URL: http://xforce.iss.net/static/6105.php


Date Reported: 2/13/01 Vulnerability: elm-long-string-bo Platforms Affected: Elm Risk Factor: Medium Attack Type: Host Based Brief Description: ELM -f command long string buffer overflow X-Force URL: http://xforce.iss.net/static/6151.php


Date Reported: 2/13/01 Vulnerability: winnt-pptp-dos Platforms Affected: Windows NT Risk Factor: Medium Attack Type: Network Based Brief Description: Windows NT PPTP denial of service X-Force URL: http://xforce.iss.net/static/6103.php


Date Reported: 2/12/01 Vulnerability: startinnfeed-format-string Platforms Affected: Inn Risk Factor: High Attack Type: Host Based Brief Description: Inn 'startinnfeed' binary format string attack X-Force URL: http://xforce.iss.net/static/6099.php


Date Reported: 2/12/01 Vulnerability: his-auktion-cgi-url Platforms Affected: HIS Auktion Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HIS Auktion CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6090.php


Date Reported: 2/12/01 Vulnerability: wayboard-cgi-view-files Platforms Affected: Way-BOARD Risk Factor: Medium Attack Type: Network Based Brief Description: Way-BOARD CGI could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6091.php


Date Reported: 2/12/01 Vulnerability: muskat-empower-url-dir Platforms Affected: Musket Empower Risk Factor: Low Attack Type: Network/Host Based Brief Description: Musket Empower could allow attackers to gain access to the DB directory path X-Force URL: http://xforce.iss.net/static/6093.php


Date Reported: 2/12/01 Vulnerability: icq-icu-rtf-dos Platforms Affected: LICQ Gnome ICU Risk Factor: Low Attack Type: Network/Host Based Brief Description: LICQ and Gnome ICU rtf file denial of service X-Force URL: http://xforce.iss.net/static/6096.php


Date Reported: 2/12/01 Vulnerability: commerce-cgi-view-files Platforms Affected: Commerce.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Commerce.cgi could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6095.php


Date Reported: 2/12/01 Vulnerability: roads-search-view-files Platforms Affected: ROADS Risk Factor: Medium Attack Type: Network Based Brief Description: ROADS could allow attackers to view unauthorized files using search.pl program X-Force URL: http://xforce.iss.net/static/6097.php


Date Reported: 2/12/01 Vulnerability: webpage-cgi-view-info Platforms Affected: WebPage.cgi Risk Factor: Low Attack Type: Network Based Brief Description: WebPage.cgi allows attackers to view sensitive information X-Force URL: http://xforce.iss.net/static/6100.php


Date Reported: 2/12/01 Vulnerability: webspirs-cgi-view-files Platforms Affected: WebSPIRS Risk Factor: Medium Attack Type: Network Based Brief Description: WebSPIRS CGI could allow an attacker to view unauthorized files X-Force URL: http://xforce.iss.net/static/6101.php


Date Reported: 2/12/01 Vulnerability: webpals-library-cgi-url Platforms Affected: WebPALS Risk Factor: Medium Attack Type: Network Based Brief Description: WebPALS Library System CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6102.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-permissions Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled with nolicense permissions X-Force URL: http://xforce.iss.net/static/6092.php


Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-symlink Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled allows symlink in nolicense X-Force URL: http://xforce.iss.net/static/6094.php


Date Reported: 2/10/01 Vulnerability: vixie-crontab-bo Platforms Affected: Vixie crontab Risk Factor: Medium Attack Type: Host Based Brief Description: Vixie crontab buffer overflow X-Force URL: http://xforce.iss.net/static/6098.php


Date Reported: 2/10/01 Vulnerability: novell-groupwise-bypass-policies Platforms Affected: Novell GroupWise Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Novell Groupwise allows user to bypass policies and view files X-Force URL: http://xforce.iss.net/static/6089.php


Date Reported: 2/9/01 Vulnerability: infobot-calc-gain-access Platforms Affected: Infobot Risk Factor: High Attack Type: Network Based Brief Description: Infobot 'calc' command allows remote users to gain access X-Force URL: http://xforce.iss.net/static/6078.php


Date Reported: 2/8/01 Vulnerability: linux-sysctl-read-memory Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux kernel sysctl() read memory X-Force URL: http://xforce.iss.net/static/6079.php


Date Reported: 2/8/01 Vulnerability: openssh-bypass-authentication Platforms Affected: OpenSSH Risk Factor: High Attack Type: Network/Host Based Brief Description: OpenSSH 2.3.1 allows remote users to bypass authentication X-Force URL: http://xforce.iss.net/static/6084.php


Date Reported: 2/8/01 Vulnerability: lotus-notes-stored-forms Platforms Affected: Lotus Notes Risk Factor: High Attack Type: Network/Host Based Brief Description: Lotus Notes stored forms X-Force URL: http://xforce.iss.net/static/6087.php


Date Reported: 2/8/01 Vulnerability: linux-ptrace-modify-process Platforms Affected: Linux Risk Factor: High Attack Type: Host Based Brief Description: Linux kernel ptrace modify process X-Force URL: http://xforce.iss.net/static/6080.php


Date Reported: 2/8/01 Vulnerability: ssh-deattack-overwrite-memory Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 deattack.c allows memory to be overwritten X-Force URL: http://xforce.iss.net/static/6083.php


Date Reported: 2/7/01 Vulnerability: dc20ctrl-port-bo Platforms Affected: FreeBSD Risk Factor: Medium Attack Type: Host Based Brief Description: FreeBSD dc20ctrl port buffer overflow X-Force URL: http://xforce.iss.net/static/6077.php


Date Reported: 2/7/01 Vulnerability: ja-xklock-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: ja-xklock buffer overflow X-Force URL: http://xforce.iss.net/static/6073.php


Date Reported: 2/7/01 Vulnerability: ja-elvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ja-elvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6074.php


Date Reported: 2/7/01 Vulnerability: ko-helvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ko-helvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6075.php


Date Reported: 2/7/01 Vulnerability: serverworx-directory-traversal Platforms Affected: ServerWorx Risk Factor: Medium Attack Type: Network Based Brief Description: ServerWorx directory traversal X-Force URL: http://xforce.iss.net/static/6081.php


Date Reported: 2/7/01 Vulnerability: ntlm-ssp-elevate-privileges Platforms Affected: NTLM Risk Factor: High Attack Type: Host Based Brief Description: NTLM Security Support Provider could allow elevation of privileges X-Force URL: http://xforce.iss.net/static/6076.php


Date Reported: 2/7/01 Vulnerability: ssh-session-key-recovery Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 session key recovery X-Force URL: http://xforce.iss.net/static/6082.php


Date Reported: 2/6/01 Vulnerability: aolserver-directory-traversal Platforms Affected: AOLserver Risk Factor: Medium Attack Type: Network Based Brief Description: AOLserver directory traversal X-Force URL: http://xforce.iss.net/static/6069.php


Date Reported: 2/6/01 Vulnerability: chilisoft-asp-elevate-privileges Platforms Affected: Chili!Soft Risk Factor: High Attack Type: Network/Host Based Brief Description: Chili!Soft ASP could allow elevated privileges X-Force URL: http://xforce.iss.net/static/6072.php


Date Reported: 2/6/01 Vulnerability: win-udp-dos Platforms Affected: Windows Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Windows UDP socket denial of service X-Force URL: http://xforce.iss.net/static/6070.php


Date Reported: 2/5/01 Vulnerability: ssh-daemon-failed-login Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH daemon failed login attempts are not logged X-Force URL: http://xforce.iss.net/static/6071.php


Date Reported: 2/5/01 Vulnerability: picserver-directory-traversal Platforms Affected: PicServer Risk Factor: Medium Attack Type: Network Based Brief Description: PicServer directory traversal X-Force URL: http://xforce.iss.net/static/6065.php


Date Reported: 2/5/01 Vulnerability: biblioweb-directory-traversal Platforms Affected: BiblioWeb Risk Factor: Medium Attack Type: Network Based Brief Description: BiblioWeb Server directory traversal X-Force URL: http://xforce.iss.net/static/6066.php


Date Reported: 2/5/01 Vulnerability: biblioweb-get-dos Platforms Affected: BiblioWeb Risk Factor: Low Attack Type: Network Based Brief Description: BiblioWeb Server GET request denial of service X-Force URL: http://xforce.iss.net/static/6068.php


Date Reported: 2/5/01 Vulnerability: ibm-netcommerce-reveal-information Platforms Affected: IBM Risk Factor: Medium Attack Type: Network/Host Based Brief Description: IBM Net.Commerce could reveal sensitive information X-Force URL: http://xforce.iss.net/static/6067.php


Date Reported: 2/5/01 Vulnerability: win-dde-elevate-privileges Platforms Affected: Windows DDE Risk Factor: High Attack Type: Host Based Brief Description: Windows DDE can allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6062.php


Date Reported: 2/4/01 Vulnerability: hsweb-directory-browsing Platforms Affected: HSWeb Risk Factor: Low Attack Type: Network Based Brief Description: HSWeb Web Server allows attacker to browse directories X-Force URL: http://xforce.iss.net/static/6061.php


Date Reported: 2/4/01 Vulnerability: sedum-directory-traversal Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6063.php


Date Reported: 2/4/01 Vulnerability: free-java-directory-traversal Platforms Affected: Free Java Risk Factor: Medium Attack Type: Network Based Brief Description: Free Java Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6064.php


Date Reported: 2/2/01 Vulnerability: goahead-directory-traversal Platforms Affected: GoAhead Risk Factor: High Attack Type: Network Based Brief Description: GoAhead Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6046.php


Date Reported: 2/2/01 Vulnerability: gnuserv-tcp-cookie-overflow Platforms Affected: Gnuserv Risk Factor: High Attack Type: Network/Host Based Brief Description: Gnuserv TCP enabled cookie buffer overflow X-Force URL: http://xforce.iss.net/static/6056.php


Date Reported: 2/2/01 Vulnerability: xmail-ctrlserver-bo Platforms Affected: Xmail CTRLServer Risk Factor: High Attack Type: Network Based Brief Description: XMail CTRLServer buffer overflow X-Force URL: http://xforce.iss.net/static/6060.php


Date Reported: 2/2/01 Vulnerability: netscape-webpublisher-acl-permissions Platforms Affected: Netscape Web Publisher Risk Factor: Medium Attack Type: Network Based Brief Description: Netcape Web Publisher poor ACL permissions X-Force URL: http://xforce.iss.net/static/6058.php


Date Reported: 2/1/01 Vulnerability: cups-httpgets-dos Platforms Affected: CUPS Risk Factor: High Attack Type: Host Based Brief Description: CUPS httpGets() function denial of service X-Force URL: http://xforce.iss.net/static/6043.php


Date Reported: 2/1/01 Vulnerability: prospero-get-pin Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero GET request reveals PIN information X-Force URL: http://xforce.iss.net/static/6044.php


Date Reported: 2/1/01 Vulnerability: prospero-weak-permissions Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero uses weak permissions X-Force URL: http://xforce.iss.net/static/6045.php


Risk Factor Key:

    High    Any vulnerability that provides an attacker with immediate
            access into a machine, gains superuser access, or bypasses
            a firewall.  Example:  A vulnerable Sendmail 8.6.5 version
            that allows an intruder to execute commands on mail
            server. 
    Medium  Any vulnerability that provides information that has a
            high potential of giving system access to an intruder. 
            Example: A misconfigured TFTP or vulnerable NIS server
            that allows an intruder to get the password file that
            could contain an account with a guessable password. 
    Low     Any vulnerability that provides information that
            potentially could lead to a compromise.  Example:  A
            finger that allows an intruder to find out who is online
            and potential accounts to attempt to crack passwords
            via brute force methods.

ISS is a leading global provider of security management solutions for e-business. By offering best-of-breed SAFEsuite(tm) security software, comprehensive ePatrol(tm) monitoring services and industry-leading expertise, ISS serves as its customers' trusted security provider protecting digital assets and ensuring the availability, confidentiality and integrity of computer systems and information critical to e-business success. ISS' security management solutions protect more than 5,000 customers including 21 of the 25 largest U.S. commercial banks, 9 of the 10 largest telecommunications companies and over 35 government agencies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe and Latin America. For more information, visit the ISS Web site at www.iss.net or call 800-776-2362.

Copyright (c) 2001 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission.

Disclaimer

The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.

X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server.

Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc.

-----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv

iQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV 1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA h0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B tT+ylKw4hn4= =kfHg -----END PGP SIGNATURE-----

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200210-0102",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 3.2,
            vendor: "ssh security",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.8,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: null,
            scope: null,
            trust: 1.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 1.6,
            vendor: "openssh",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(1c\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.3\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(2.13\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.2\\(0.110\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.3\\(0.7\\)pan",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(1b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.2\\(0.111\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ye",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(8a\\)ex",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2bc",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2ya",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sp",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xb",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xr",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ec",
         },
         {
            model: "css11000 content services switch",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(4\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xj",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1a\\)csx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yb",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(3\\)csx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yg",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(3\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xi",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(1\\)ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0s",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(9\\)ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xg",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(13\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2b",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xm",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "pix firewall software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(6\\)csx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xq",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1\\(5c\\)ex",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(2\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xm",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(2\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5\\)csx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2dd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xi",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(4\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2da",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1\\)csx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2yd",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4b\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.2xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xf",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "core sdi",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "debian",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "smoothwall",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "suse",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "holger lamm",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "pix firewall",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "5.2",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(5c\\)ex:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:css11000_content_services_switch:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Systems Product Security Incident Response Team※ psirt@cisco.com",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2002-1024",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2002-1024",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-5413",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2002-1024",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#290140",
                  trust: 0.8,
                  value: "21.09",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#13877",
                  trust: 0.8,
                  value: "6.84",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#25309",
                  trust: 0.8,
                  value: "0.39",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#945216",
                  trust: 0.8,
                  value: "99.00",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#566640",
                  trust: 0.8,
                  value: "0.68",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#651994",
                  trust: 0.8,
                  value: "1.50",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#315308",
                  trust: 0.8,
                  value: "2.06",
               },
               {
                  author: "NVD",
                  id: "CVE-2002-1024",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200210-194",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-5413",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144). Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. IOS is an Internet operating system distributed by CISCO and used on CISCO routers. When processing very large packets, the SSH process consumes most of the CPU instruction cycles, causing it to stop responding to normal communication, resulting in a denial of service. In some cases, it may cause the CISCO equipment to restart. The problem lies in deattack.c, because a 16-bit unsigned variable is mistakenly used as a 32-bit variable in the detect_attack() function, resulting in a table index overflow problem and a denial of service attack. For details, please refer to SSH1 daemon crc32 compensation attack detection security vulnerability ( http://security.nsfocus.com/showQuery.asp?bugID=1262 ). \nTO UNSUBSCRIBE: email \"unsubscribe alert\" in the body of your message to\nmajordomo@iss.net  Contact alert-owner@iss.net for help with any problems!\n---------------------------------------------------------------------------\n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nISS X-Force has received reports that some individuals were unable to \nverify the PGP signature on the Security Alert Summary distributed earlier \nin the week. Due to this issue, X-Force is re-distributing the Security \nAlert Summary. We apologize for any inconvience this may have caused. \n\nInternet Security Systems Security Alert Summary\nMarch 5, 2001\nVolume 6 Number 4\n\nX-Force Vulnerability and Threat Database: http://xforce.iss.net/ To\nreceive these Alert Summaries as well as other Alerts and Advisories,\nsubscribe to the Internet Security Systems Alert mailing list at:\nhttp://xforce.iss.net/maillists/index.php\n\nThis summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php\n_____\n\nContents\n\n90 Reported Vulnerabilities\n\nRisk Factor Key\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-dos\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6161.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          a1-server-directory-traversal\nPlatforms Affected:     A1 Server\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      A1 Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6162.php\n\n_____\n\nDate Reported:          2/27/01\nVulnerability:          webreflex-web-server-dos\nPlatforms Affected:     WebReflex\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebReflex Web server denial of service\nX-Force URL:            http://xforce.iss.net/static/6163.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          sudo-bo-elevate-privileges\nPlatforms Affected:     Sudo\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Sudo buffer overflow could allow elevated user privileges\nX-Force URL:            http://xforce.iss.net/static/6153.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-skin-overwrite-file\nPlatforms Affected:     My GetRight\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      My GetRight 'skin' allows remote attacker to overwrite existing files\nX-Force URL:            http://xforce.iss.net/static/6155.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          mygetright-directory-traversal\nPlatforms Affected:     My GetRight\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      My GetRight directory traversal\nX-Force URL:            http://xforce.iss.net/static/6156.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          win2k-event-viewer-bo\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Host Based\nBrief Description:      Windows 2000 event viewer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6160.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-cpu-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra CPU denial of service\nX-Force URL:            http://xforce.iss.net/static/6159.php\n\n_____\n\nDate Reported:          2/26/01\nVulnerability:          netscape-collabra-kernel-dos\nPlatforms Affected:     Netscape\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netscape Collabra Server kernel denial of service\nX-Force URL:            http://xforce.iss.net/static/6158.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          mercur-expn-bo\nPlatforms Affected:     MERCUR\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      MERCUR Mailserver EXPN buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6149.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          sedum-http-dos\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP server denial of service\nX-Force URL:            http://xforce.iss.net/static/6152.php\n\n_____\n\nDate Reported:          2/23/01\nVulnerability:          tru64-inetd-dos\nPlatforms Affected:     Tru64\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Tru64 UNIX inetd denial of service\nX-Force URL:            http://xforce.iss.net/static/6157.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          outlook-vcard-bo\nPlatforms Affected:     Microsoft Outlook\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Outlook and Outlook Express vCards buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6145.php\n\n_____\n\nDate Reported:          2/22/01\nVulnerability:          ultimatebb-cookie-member-number\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board cookie allows attacker to change member number\nX-Force URL:            http://xforce.iss.net/static/6144.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          ultimatebb-cookie-gain-privileges\nPlatforms Affected:     Ultimate Bulletin Board\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Ultimate Bulletin Board allows remote attacker to obtain cookie information\nX-Force URL:            http://xforce.iss.net/static/6142.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          sendmail-elevate-privileges\nPlatforms Affected:     Sendmail\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Sendmail -bt command could allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6147.php\n\n_____\n\nDate Reported:          2/21/01\nVulnerability:          jre-jdk-execute-commands\nPlatforms Affected:     JRE/JDK\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      JRE/JDK could allow unauthorized execution of commands\nX-Force URL:            http://xforce.iss.net/static/6143.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          licq-remote-port-dos\nPlatforms Affected:     LICQ\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      LICQ remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6134.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          pgp4pine-expired-keys\nPlatforms Affected:     pgp4pine\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      pgp4pine may transmit messages using expired public keys\nX-Force URL:            http://xforce.iss.net/static/6135.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          chilisoft-asp-view-files\nPlatforms Affected:     Chili!Soft ASP\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Chili!Soft ASP allows remote attackers to gain access to sensitive information\nX-Force URL:            http://xforce.iss.net/static/6137.php\n\n_____\n\nDate Reported:          2/20/01\nVulnerability:          win2k-domain-controller-dos\nPlatforms Affected:     Windows 2000\nRisk Factor:            once-only\nAttack Type:            Network/Host Based\nBrief Description:      Windows 2000 domain controller denial of service\nX-Force URL:            http://xforce.iss.net/static/6136.php\n\n_____\n\nDate Reported:          2/19/01\nVulnerability:          asx-remote-dos\nPlatforms Affected:     ASX Switches\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ASX switches allow remote denial of service\nX-Force URL:            http://xforce.iss.net/static/6133.php\n\n_____\n\nDate Reported:          2/18/01\nVulnerability:          http-cgi-mailnews-username\nPlatforms Affected:     Mailnews.cgi\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Mailnews.cgi allows remote attacker to execute shell commands using username\nX-Force URL:            http://xforce.iss.net/static/6139.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-reveal-path\nPlatforms Affected:     BadBlue\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library reveals path\nX-Force URL:            http://xforce.iss.net/static/6130.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          badblue-ext-dos\nPlatforms Affected:     BadBlue\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BadBlue ext.dll library denial of service\nX-Force URL:            http://xforce.iss.net/static/6131.php\n\n_____\n\nDate Reported:          2/17/01\nVulnerability:          moby-netsuite-bo\nPlatforms Affected:     Moby's NetSuite\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Moby's NetSuite Web server buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6132.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          webactive-directory-traversal\nPlatforms Affected:     WEBactive\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      WEBactive HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6121.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          esone-cgi-directory-traversal\nPlatforms Affected:     ES.One store.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Thinking Arts ES.One store.cgi directory traversal\nX-Force URL:            http://xforce.iss.net/static/6124.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-username-bo\nPlatforms Affected:     VShell\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      VShell username buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6146.php\n\n_____\n\nDate Reported:          2/16/01\nVulnerability:          vshell-port-forwarding-rule\nPlatforms Affected:     VShell\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      VShell uses weak port forwarding rule\nX-Force URL:            http://xforce.iss.net/static/6148.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-isapi-bo\nPlatforms Affected:     Pi3Web\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Pi3Web ISAPI tstisapi.dll denial of service\nX-Force URL:            http://xforce.iss.net/static/6113.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          pi3web-reveal-path\nPlatforms Affected:     Pi3Web\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Pi3Web reveals physical path of server\nX-Force URL:            http://xforce.iss.net/static/6114.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-execute-shell\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer execute shell commands\nX-Force URL:            http://xforce.iss.net/static/6117.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          bajie-directory-traversal\nPlatforms Affected:     Bajie HTTP JServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Bajie HTTP JServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6115.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          resin-directory-traversal\nPlatforms Affected:     Resin\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Resin Web server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6118.php\n\n_____\n\nDate Reported:          2/15/01\nVulnerability:          netware-mitm-recover-passwords\nPlatforms Affected:     Netware\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      Netware \"man in the middle\" attack password recovery\nX-Force URL:            http://xforce.iss.net/static/6116.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          firebox-pptp-dos\nPlatforms Affected:     WatchGuard Firebox II\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      WatchGuard Firebox II PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6109.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-virtualvault-iws-dos\nPlatforms Affected:     HP VirtualVault\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HP VirtualVault iPlanet Web Server denial of service\nX-Force URL:            http://xforce.iss.net/static/6110.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          kicq-execute-commands\nPlatforms Affected:     KICQ\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      kicq could allow remote execution of commands\nX-Force URL:            http://xforce.iss.net/static/6112.php\n\n_____\n\nDate Reported:          2/14/01\nVulnerability:          hp-text-editor-bo\nPlatforms Affected:     HPUX\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      HP Text editors buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6111.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          sendtemp-pl-read-files\nPlatforms Affected:     sendtemp.pl\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      sendtemp.pl could allow an attacker to read files on the server\nX-Force URL:            http://xforce.iss.net/static/6104.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          analog-alias-bo\nPlatforms Affected:     Analog ALIAS\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Analog ALIAS command buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6105.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          elm-long-string-bo\nPlatforms Affected:     Elm\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      ELM -f command long string buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6151.php\n\n_____\n\nDate Reported:          2/13/01\nVulnerability:          winnt-pptp-dos\nPlatforms Affected:     Windows NT\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Windows NT PPTP denial of service\nX-Force URL:            http://xforce.iss.net/static/6103.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          startinnfeed-format-string\nPlatforms Affected:     Inn\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Inn 'startinnfeed' binary format string attack\nX-Force URL:            http://xforce.iss.net/static/6099.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          his-auktion-cgi-url\nPlatforms Affected:     HIS Auktion\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      HIS Auktion CGI script could allow attackers to view unauthorized \n                        files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6090.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          wayboard-cgi-view-files\nPlatforms Affected:     Way-BOARD\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Way-BOARD CGI could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6091.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          muskat-empower-url-dir\nPlatforms Affected:     Musket Empower\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      Musket Empower could allow attackers to gain access to the DB directory path\nX-Force URL:            http://xforce.iss.net/static/6093.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          icq-icu-rtf-dos\nPlatforms Affected:     LICQ\n                        Gnome ICU\nRisk Factor:            Low\nAttack Type:            Network/Host Based\nBrief Description:      LICQ and Gnome ICU rtf file denial of service\nX-Force URL:            http://xforce.iss.net/static/6096.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          commerce-cgi-view-files\nPlatforms Affected:     Commerce.cgi\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Commerce.cgi could allow attackers to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6095.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          roads-search-view-files\nPlatforms Affected:     ROADS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ROADS could allow attackers to view unauthorized files using search.pl program\nX-Force URL:            http://xforce.iss.net/static/6097.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpage-cgi-view-info\nPlatforms Affected:     WebPage.cgi\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      WebPage.cgi allows attackers to view sensitive information\nX-Force URL:            http://xforce.iss.net/static/6100.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webspirs-cgi-view-files\nPlatforms Affected:     WebSPIRS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebSPIRS CGI could allow an attacker to view unauthorized files\nX-Force URL:            http://xforce.iss.net/static/6101.php\n\n_____\n\nDate Reported:          2/12/01\nVulnerability:          webpals-library-cgi-url\nPlatforms Affected:     WebPALS\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      WebPALS Library System CGI script could allow attackers to view \n                        unauthorized files or execute commands\nX-Force URL:            http://xforce.iss.net/static/6102.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-permissions\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled with nolicense permissions\nX-Force URL:            http://xforce.iss.net/static/6092.php\n\n_____\n\nDate Reported:          2/11/01\nVulnerability:          cobol-apptrack-nolicense-symlink\nPlatforms Affected:     MicroFocus Cobol\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      MicroFocus Cobol with AppTrack enabled allows symlink in nolicense\nX-Force URL:            http://xforce.iss.net/static/6094.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          vixie-crontab-bo\nPlatforms Affected:     Vixie crontab\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Vixie crontab buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6098.php\n\n_____\n\nDate Reported:          2/10/01\nVulnerability:          novell-groupwise-bypass-policies\nPlatforms Affected:     Novell GroupWise\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Novell Groupwise allows user to bypass policies and view files\nX-Force URL:            http://xforce.iss.net/static/6089.php\n\n_____\n\nDate Reported:          2/9/01\nVulnerability:          infobot-calc-gain-access\nPlatforms Affected:     Infobot\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      Infobot 'calc' command allows remote users to gain access\nX-Force URL:            http://xforce.iss.net/static/6078.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-sysctl-read-memory\nPlatforms Affected:     Linux\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      Linux kernel sysctl() read memory\nX-Force URL:            http://xforce.iss.net/static/6079.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          openssh-bypass-authentication\nPlatforms Affected:     OpenSSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      OpenSSH 2.3.1 allows remote users to bypass authentication\nX-Force URL:            http://xforce.iss.net/static/6084.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          lotus-notes-stored-forms\nPlatforms Affected:     Lotus Notes\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Lotus Notes stored forms\nX-Force URL:            http://xforce.iss.net/static/6087.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          linux-ptrace-modify-process\nPlatforms Affected:     Linux\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Linux kernel ptrace modify process\nX-Force URL:            http://xforce.iss.net/static/6080.php\n\n_____\n\nDate Reported:          2/8/01\nVulnerability:          ssh-deattack-overwrite-memory\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 deattack.c allows memory to be overwritten\nX-Force URL:            http://xforce.iss.net/static/6083.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          dc20ctrl-port-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            Medium\nAttack Type:            Host Based\nBrief Description:      FreeBSD dc20ctrl port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6077.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-xklock-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      ja-xklock buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6073.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ja-elvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ja-elvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6074.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ko-helvis-elvrec-bo\nPlatforms Affected:     FreeBSD\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      FreeBSD ko-helvis port buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6075.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          serverworx-directory-traversal\nPlatforms Affected:     ServerWorx\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      ServerWorx directory traversal\nX-Force URL:            http://xforce.iss.net/static/6081.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ntlm-ssp-elevate-privileges\nPlatforms Affected:     NTLM\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      NTLM Security Support Provider could allow elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6076.php\n\n_____\n\nDate Reported:          2/7/01\nVulnerability:          ssh-session-key-recovery\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH protocol 1.5 session key recovery\nX-Force URL:            http://xforce.iss.net/static/6082.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          aolserver-directory-traversal\nPlatforms Affected:     AOLserver\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      AOLserver directory traversal\nX-Force URL:            http://xforce.iss.net/static/6069.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          chilisoft-asp-elevate-privileges\nPlatforms Affected:     Chili!Soft\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Chili!Soft ASP could allow elevated privileges\nX-Force URL:            http://xforce.iss.net/static/6072.php\n\n_____\n\nDate Reported:          2/6/01\nVulnerability:          win-udp-dos\nPlatforms Affected:     Windows\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      Windows UDP socket denial of service\nX-Force URL:            http://xforce.iss.net/static/6070.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ssh-daemon-failed-login\nPlatforms Affected:     SSH\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      SSH daemon failed login attempts are not logged\nX-Force URL:            http://xforce.iss.net/static/6071.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          picserver-directory-traversal\nPlatforms Affected:     PicServer\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      PicServer directory traversal\nX-Force URL:            http://xforce.iss.net/static/6065.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-directory-traversal\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6066.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          biblioweb-get-dos\nPlatforms Affected:     BiblioWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      BiblioWeb Server GET request denial of service\nX-Force URL:            http://xforce.iss.net/static/6068.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          ibm-netcommerce-reveal-information\nPlatforms Affected:     IBM\nRisk Factor:            Medium\nAttack Type:            Network/Host Based\nBrief Description:      IBM Net.Commerce could reveal sensitive information\nX-Force URL:            http://xforce.iss.net/static/6067.php\n\n_____\n\nDate Reported:          2/5/01\nVulnerability:          win-dde-elevate-privileges\nPlatforms Affected:     Windows DDE\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      Windows DDE can allow the elevation of privileges\nX-Force URL:            http://xforce.iss.net/static/6062.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          hsweb-directory-browsing\nPlatforms Affected:     HSWeb\nRisk Factor:            Low\nAttack Type:            Network Based\nBrief Description:      HSWeb Web Server allows attacker to browse directories\nX-Force URL:            http://xforce.iss.net/static/6061.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          sedum-directory-traversal\nPlatforms Affected:     SEDUM\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      SEDUM HTTP Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6063.php\n\n_____\n\nDate Reported:          2/4/01\nVulnerability:          free-java-directory-traversal\nPlatforms Affected:     Free Java\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Free Java Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6064.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          goahead-directory-traversal\nPlatforms Affected:     GoAhead\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      GoAhead Web Server directory traversal\nX-Force URL:            http://xforce.iss.net/static/6046.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          gnuserv-tcp-cookie-overflow\nPlatforms Affected:     Gnuserv\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Gnuserv TCP enabled cookie buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6056.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          xmail-ctrlserver-bo\nPlatforms Affected:     Xmail CTRLServer\nRisk Factor:            High\nAttack Type:            Network Based\nBrief Description:      XMail CTRLServer buffer overflow\nX-Force URL:            http://xforce.iss.net/static/6060.php\n\n_____\n\nDate Reported:          2/2/01\nVulnerability:          netscape-webpublisher-acl-permissions\nPlatforms Affected:     Netscape Web Publisher\nRisk Factor:            Medium\nAttack Type:            Network Based\nBrief Description:      Netcape Web Publisher poor ACL permissions\nX-Force URL:            http://xforce.iss.net/static/6058.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          cups-httpgets-dos\nPlatforms Affected:     CUPS\nRisk Factor:            High\nAttack Type:            Host Based\nBrief Description:      CUPS httpGets() function denial of service\nX-Force URL:            http://xforce.iss.net/static/6043.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-get-pin\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero GET request reveals PIN information\nX-Force URL:            http://xforce.iss.net/static/6044.php\n\n_____\n\nDate Reported:          2/1/01\nVulnerability:          prospero-weak-permissions\nPlatforms Affected:     Prospero\nRisk Factor:            High\nAttack Type:            Network/Host Based\nBrief Description:      Prospero uses weak permissions\nX-Force URL:            http://xforce.iss.net/static/6045.php\n\n_____\n\nRisk Factor Key:\n\n        High    Any vulnerability that provides an attacker with immediate\n                access into a machine, gains superuser access, or bypasses\n                a firewall.  Example:  A vulnerable Sendmail 8.6.5 version\n                that allows an intruder to execute commands on mail\n                server. \n        Medium  Any vulnerability that provides information that has a\n                high potential of giving system access to an intruder. \n                Example: A misconfigured TFTP or vulnerable NIS server\n                that allows an intruder to get the password file that\n                could contain an account with a guessable password. \n        Low     Any vulnerability that provides information that\n                potentially could lead to a compromise.  Example:  A\n                finger that allows an intruder to find out who is online\n                and potential accounts to attempt to crack passwords\n                via brute force methods. \n\n________\n\n\nISS is a leading global provider of security management solutions for\ne-business. By offering best-of-breed SAFEsuite(tm) security software,\ncomprehensive ePatrol(tm) monitoring services and industry-leading\nexpertise, ISS serves as its customers' trusted security provider\nprotecting digital assets and ensuring the availability, confidentiality and\nintegrity of computer systems and information critical to e-business\nsuccess. ISS' security management solutions protect more than 5,000\ncustomers including 21 of the 25 largest U.S. commercial banks, 9 of the 10\nlargest telecommunications companies and over 35 government agencies. \nFounded in 1994, ISS is headquartered in Atlanta, GA, with additional\noffices throughout North America and international operations in Asia,\nAustralia, Europe and Latin America. For more information, visit the ISS Web\nsite at www.iss.net or call 800-776-2362. \n\nCopyright (c) 2001 by Internet Security Systems, Inc. \n\nPermission is hereby granted for the redistribution of this Alert\nelectronically.  It is not to be edited in any way without express consent\nof the X-Force.  If you wish to reprint the whole or any part of this Alert\nin any other medium excluding electronic medium, please e-mail\nxforce@iss.net for permission. \n\nDisclaimer\n\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There are\nNO warranties with regard to this information. In no event shall the author\nbe liable for any damages whatsoever arising out of or in connection with\nthe use or spread of this information. Any use of this information is at the\nuser's own risk. \n\n\n\nX-Force PGP Key available at: http://xforce.iss.net/sensitive.php as \nwell as on MIT's PGP key server and PGP.com's key server. \n\nPlease send suggestions, updates, and comments to: X-Force xforce@iss.net\nof Internet Security Systems, Inc. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: 2.6.3a\nCharset: noconv\n\niQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV\n1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA\nh0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B\ntT+ylKw4hn4=\n=kfHg\n-----END PGP SIGNATURE-----\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            db: "PACKETSTORM",
            id: "24431",
         },
      ],
      trust: 6.84,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "5114",
            trust: 3.3,
         },
         {
            db: "CERT/CC",
            id: "VU#290140",
            trust: 3.3,
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
            trust: 3.2,
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
            trust: 2.5,
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
            trust: 2.4,
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
            trust: 2.4,
         },
         {
            db: "XF",
            id: "6083",
            trust: 0.9,
         },
         {
            db: "XF",
            id: "6135",
            trust: 0.9,
         },
         {
            db: "XF",
            id: "6063",
            trust: 0.9,
         },
         {
            db: "XF",
            id: "6449",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2347",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2405",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2335",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#651994",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "6472",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20020627 SCANNING FOR SSH CAN CAUSE A CRASH",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "9437",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-5413",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6115",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6075",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6149",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6145",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6136",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6065",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6157",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6058",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6161",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6109",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6121",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6062",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6137",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6101",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6089",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6072",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6143",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6084",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6100",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6080",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6071",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6073",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6116",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6144",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6104",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6094",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6087",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6090",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6046",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6056",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6060",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6130",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6092",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6118",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6117",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6098",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6156",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6113",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6067",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6064",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6045",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6147",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6095",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6131",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6114",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6134",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6074",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6044",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6112",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6077",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6148",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6146",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6078",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6110",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6132",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6099",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6079",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6102",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6096",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6142",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6091",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6158",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6162",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6163",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6155",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6081",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6160",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6111",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6152",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6068",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6043",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6076",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6103",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6070",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6133",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6153",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6082",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6124",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6061",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6066",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6097",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6105",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6159",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6069",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6093",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6139",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "6151",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "24431",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "PACKETSTORM",
            id: "24431",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   id: "VAR-200210-0102",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-07-23T22:06:08.093000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "SSH-scanning",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/ssh-scanning.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.3,
            url: "http://www.securityfocus.com/bid/5114",
         },
         {
            trust: 2.5,
            url: "http://www.cisco.com/warp/public/707/ssh-scanning.shtml",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/290140",
         },
         {
            trust: 2.4,
            url: "http://www.kb.cert.org/vuls/id/13877",
         },
         {
            trust: 2.4,
            url: "http://www.ssh.com/products/ssh/cert/",
         },
         {
            trust: 1.7,
            url: "http://www.iss.net/security_center/static/9437.php",
         },
         {
            trust: 1.6,
            url: "http://www.cert.org/advisories/ca-2001-35.html",
         },
         {
            trust: 1.6,
            url: "http://www.kb.cert.org/vuls/id/945216",
         },
         {
            trust: 1.6,
            url: "http://www.kb.cert.org/vuls/id/25309",
         },
         {
            trust: 0.9,
            url: "http://xforce.iss.net/static/6083.php",
         },
         {
            trust: 0.9,
            url: "http://xforce.iss.net/static/6135.php",
         },
         {
            trust: 0.9,
            url: "http://xforce.iss.net/static/6063.php",
         },
         {
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/ssh-multiple-pub.html",
         },
         {
            trust: 0.8,
            url: "http://www.corest.com/files/files/11/crc32.pdf",
         },
         {
            trust: 0.8,
            url: "http://www1.corest.com/common/showdoc.php?idx=131&idxseccion=10",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/6449.php",
         },
         {
            trust: 0.8,
            url: "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html",
         },
         {
            trust: 0.8,
            url: "http://www1.corest.com/common/showdoc.php?idx=81&idxsection=10#",
         },
         {
            trust: 0.8,
            url: "http://www.openssh.com/security.html",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2347",
         },
         {
            trust: 0.8,
            url: "http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/alerts/advise100.php",
         },
         {
            trust: 0.8,
            url: "http://www.cryptnet.net/fcp/audit/pgp4pine/01.html",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2405",
         },
         {
            trust: 0.8,
            url: "http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html",
         },
         {
            trust: 0.8,
            url: "http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html",
         },
         {
            trust: 0.8,
            url: "http://pgp4pine.flatline.de/",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2335",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/archive/1/160452",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/6472.php",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1024",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1024",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6144.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6091.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6149.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6156.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6153.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6060.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6078.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6098.php",
         },
         {
            trust: 0.1,
            url: "https://www.iss.net",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6103.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6130.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6109.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6073.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6061.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6064.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6043.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6069.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6114.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6097.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6145.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6099.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6151.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6132.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6148.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6070.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6118.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6115.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6062.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6092.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6105.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6046.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6157.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6076.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6111.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6143.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6045.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6104.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6124.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6082.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6116.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6077.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6152.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6079.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6084.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6133.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6160.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6080.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6044.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6089.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6162.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6137.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6112.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6147.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6090.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6117.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6094.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6056.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6110.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/alerts/vol-6_num-4.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6074.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6155.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6058.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6102.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6121.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6139.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6146.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6081.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6095.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6071.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6159.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6134.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6100.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/maillists/index.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6101.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6096.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6066.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6113.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6093.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6065.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6087.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6068.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/sensitive.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6072.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6158.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6142.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6067.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6161.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6136.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6075.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6131.php",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/static/6163.php",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "PACKETSTORM",
            id: "24431",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            db: "PACKETSTORM",
            id: "24431",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2002-06-27T00:00:00",
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            date: "2001-11-07T00:00:00",
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            date: "2000-09-26T00:00:00",
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            date: "2001-10-24T00:00:00",
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            date: "2001-07-12T00:00:00",
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            date: "2001-05-16T00:00:00",
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            date: "2001-01-18T00:00:00",
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            date: "2002-10-04T00:00:00",
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            date: "2001-03-13T23:54:42",
            db: "PACKETSTORM",
            id: "24431",
         },
         {
            date: "2002-06-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            date: "2002-10-04T04:00:00",
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2002-12-12T00:00:00",
            db: "CERT/CC",
            id: "VU#290140",
         },
         {
            date: "2003-05-20T00:00:00",
            db: "CERT/CC",
            id: "VU#13877",
         },
         {
            date: "2002-03-05T00:00:00",
            db: "CERT/CC",
            id: "VU#25309",
         },
         {
            date: "2003-05-20T00:00:00",
            db: "CERT/CC",
            id: "VU#945216",
         },
         {
            date: "2002-01-15T00:00:00",
            db: "CERT/CC",
            id: "VU#566640",
         },
         {
            date: "2001-06-26T00:00:00",
            db: "CERT/CC",
            id: "VU#651994",
         },
         {
            date: "2002-03-05T00:00:00",
            db: "CERT/CC",
            id: "VU#315308",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULHUB",
            id: "VHN-5413",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2002-000146",
         },
         {
            date: "2007-09-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
         {
            date: "2018-10-30T16:25:31.933000",
            db: "NVD",
            id: "CVE-2002-1024",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "24431",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple Cisco products consume excessive CPU resources in response to large SSH packets",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#290140",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200210-194",
         },
      ],
      trust: 0.6,
   },
}

var-200512-0215
Vulnerability from variot

Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Multiple unspecified Cisco Catalyst switches are prone to a denial of service vulnerability. These devices are susceptible to a remote denial of service vulnerability when handling TCP 'LanD' packets. This issue allows remote attackers to crash affected devices, or to temporarily block further network routing functionality. This will deny further network services to legitimate users. As no specific Cisco devices were identified by the reporter of this issue, all Cisco Catalyst devices have been marked as vulnerable. This BID will be updated as further information on affected packages is available

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0215",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catalyst csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "60005.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.6\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "11.2\\(8.2\\)sa6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.6\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.3\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.5\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.4\\(4a\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(5.2\\)xu",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 8500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5_\\(10\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(1a\\)",
         },
         {
            model: "catalyst 6000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4908g-l3",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4912g",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(1\\)",
         },
         {
            model: "catalyst 2926gl",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4200",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "sup3",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 2948-ge-tx",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(1\\)",
         },
         {
            model: "catalyst 3750",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 7600",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(4\\)",
         },
         {
            model: "catalyst 8540csr",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(3\\)",
         },
         {
            model: "catalyst 3900",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(0.7\\)pan",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(3\\)csx",
         },
         {
            model: "catalyst 4500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 3200",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1c\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 2800 series",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2926",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2970",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(2a\\)",
         },
         {
            model: "catalyst 2900",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "lre_xl",
         },
         {
            model: "catalyst 1200 series",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(3\\)",
         },
         {
            model: "catalyst 2820",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "9.0_0.07",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(13\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(6\\)csx",
         },
         {
            model: "catalyst 4510r",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4948",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "sup2plus",
         },
         {
            model: "catalyst 3000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 8540msr",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 5509",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2948g-l3",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2.13\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(7\\)",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(4\\)csx",
         },
         {
            model: "catalyst 2902",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6000 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst ws-c2924-xl",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(13a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(4b\\)",
         },
         {
            model: "catalyst 1900 series",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "9.0_0.07",
         },
         {
            model: "catalyst 6000 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 4232-13",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(0.110\\)",
         },
         {
            model: "catalyst 5000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4840g",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2926t",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6000 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5a\\)csx",
         },
         {
            model: "catalyst 5505",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4a\\)",
         },
         {
            model: "catalyst 8510msr",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(5\\)",
         },
         {
            model: "catalyst 2900",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "xl",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(2\\)",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(6\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1d\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(10\\)",
         },
         {
            model: "catalyst 2820",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 3560",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4232",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 8510csr",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2980g-a",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(9\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(3\\)",
         },
         {
            model: "catalyst 2950 lre",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(11\\)",
         },
         {
            model: "catalyst 2926gs",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6000 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(12\\)",
         },
         {
            model: "catalyst 3500 xl",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 2980g",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 3750 metro",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(4\\)",
         },
         {
            model: "catalyst 2900",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6624",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0\\(7\\)",
         },
         {
            model: "catalyst 1900 series",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2926f",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 6500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2901",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2940",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 3550",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4506",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4507r",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(2\\)",
         },
         {
            model: "catalyst 4224",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2950",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 2948",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6608",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(2\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5\\)csx",
         },
         {
            model: "catalyst 6000 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 2955",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(0.111\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4b\\)",
         },
         {
            model: "catalyst 4503",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(3\\)",
         },
         {
            model: "catalyst 2920",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(19\\)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "50006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40005.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50005.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(13)",
         },
         {
            model: "catalyst sup720/msfc3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "catalyst xu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "290012.0",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2955",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65097.6(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.110)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1",
         },
         {
            model: "catalyst 2948g-ge-tx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.3(4)",
         },
         {
            model: "catalyst lre",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2950",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(1)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3.5",
         },
         {
            model: "catalyst metro",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3750",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst sup720/msfc3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(3)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(5)",
         },
         {
            model: "catalyst 2926t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2902",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2948",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6608",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst sup5",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "28209.00.07",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65096.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2800",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40067.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(3)",
         },
         {
            model: "catalyst ws-c2924m-xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(8)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst sup4",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29005.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55006.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4200",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2901",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29005.5(6)",
         },
         {
            model: "catalyst 8510msr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2950",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6624",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29004.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4506",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(5)",
         },
         {
            model: "catalyst 4840g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "39203.0(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2940",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(2)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst 2980g-a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(1)",
         },
         {
            model: "catalyst xu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "350012.0",
         },
         {
            model: "catalyst 8540msr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3(4)",
         },
         {
            model: "catalyst 2980g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2926",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(1)",
         },
         {
            model: "catalyst xl",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(2)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.111)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65096.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.1(1)",
         },
         {
            model: "catalyst 8510csr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29006.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4800",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(2)",
         },
         {
            model: "catalyst sup2plus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(11)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3550",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29004.5(11)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2920",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(7)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst pan",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(2.13)",
         },
         {
            model: "catalyst sup3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55055.5(19)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(7)",
         },
         {
            model: "catalyst sup2/msfc2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(6)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst 2926f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "19009.00.07",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4948",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40066.3(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1200",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5509",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(8)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5505",
         },
         {
            model: "catalyst 4510r",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2948g-l3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1(2)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(4)",
         },
         {
            model: "catalyst sup2/msfc2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst sup2plus",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst access gateway switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4224",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "catalyst sup2plus ts",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4500",
         },
         {
            model: "catalyst 2948g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(2)",
         },
         {
            model: "catalyst 2926gs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2926gl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst sup3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst xl",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4232",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3560",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(13)",
         },
         {
            model: "catalyst 4912g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4232-13",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29006.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2970",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4500",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst 4908g-l3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3750",
         },
         {
            model: "catalyst sa6",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "290011.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(1)",
         },
         {
            model: "catalyst 4507r",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4503",
         },
         {
            model: "catalyst 8540csr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2820",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1.2",
         },
         {
            model: "catalyst lre xl",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "15864",
         },
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2800_series:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2820:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2920:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2950:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3200:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3500_xl:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup3:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup4:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4500:*:*:sup2plus_ts:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4948:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst:sup3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_1200_series:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2900:lre_xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2900:xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2940:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2970:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3750:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3750_metro:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4224:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4232:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4840g:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000:*:*:sup2_msfc2:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000:*:*:sup720_msfc3:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6624:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_8500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_8510csr:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst:4.5_\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst:sup2plus:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2820:9.0_0.07:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2900:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2950_lre:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2955:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3550:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3560:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup5:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4200:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_5505:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_5509:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6608:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_8540msr:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_ws-c2924-xl:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2\\(8.2\\)sa6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_1900_series:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_1900_series:9.0_0.07:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_3900:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:sup2plus:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4232-13:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4908g-l3:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_8510msr:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_8540csr:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Justin M. Wray",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2005-4258",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-15466",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2005-4258",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200512-297",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-15466",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-15466",
         },
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID. Multiple unspecified Cisco Catalyst switches are prone to a denial of service vulnerability. \nThese devices are susceptible to a remote denial of service vulnerability when handling TCP 'LanD' packets. \nThis issue allows remote attackers to crash affected devices, or to temporarily block further network routing functionality. This will deny further network services to legitimate users. \nAs no specific Cisco devices were identified by the reporter of this issue, all Cisco Catalyst devices have been marked as vulnerable. This BID will be updated as further information on affected packages is available",
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            db: "BID",
            id: "15864",
         },
         {
            db: "VULHUB",
            id: "VHN-15466",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "15864",
            trust: 2,
         },
         {
            db: "NVD",
            id: "CVE-2005-4258",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "44543",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-15466",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-15466",
         },
         {
            db: "BID",
            id: "15864",
         },
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   id: "VAR-200512-0215",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-15466",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T13:16:05.129000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/15864",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/44543",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/en/us/products/sw/voicesw/ps4625/index.html",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/cc/pd/si/casi/ca3500xl/index.shtml",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/advisory.html",
         },
         {
            trust: 0.3,
            url: "/archive/1/419520",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-15466",
         },
         {
            db: "BID",
            id: "15864",
         },
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-15466",
         },
         {
            db: "BID",
            id: "15864",
         },
         {
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-12-15T00:00:00",
            db: "VULHUB",
            id: "VHN-15466",
         },
         {
            date: "2005-12-14T00:00:00",
            db: "BID",
            id: "15864",
         },
         {
            date: "2005-12-15T11:03:00",
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            date: "2005-12-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-07-20T00:00:00",
            db: "VULHUB",
            id: "VHN-15466",
         },
         {
            date: "2005-12-14T00:00:00",
            db: "BID",
            id: "15864",
         },
         {
            date: "2017-07-20T01:29:12.720000",
            db: "NVD",
            id: "CVE-2005-4258",
         },
         {
            date: "2005-12-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst Switches LanD Packet denial of service vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200512-297",
         },
      ],
      trust: 0.6,
   },
}

var-200305-0033
Vulnerability from variot

Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password. Cisco Catalyst version 7.5(1) has an unknown vulnerability

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200305-0033",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.5\\(1\\)",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            db: "BID",
            id: "86900",
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unknown",
      sources: [
         {
            db: "BID",
            id: "86900",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2003-0216",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: true,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9.3,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8.6,
                  id: "VHN-7045",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2003-0216",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#443257",
                  trust: 0.8,
                  value: "17.81",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200305-037",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-7045",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password. Cisco Catalyst version 7.5(1) has an unknown vulnerability",
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            db: "BID",
            id: "86900",
         },
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#443257",
            trust: 2.8,
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
            trust: 2,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20030424 CISCO SECURITY ADVISORY: CISCO CATALYST ENABLE PASSWORD BYPASS VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "86900",
            trust: 0.4,
         },
         {
            db: "VULHUB",
            id: "VHN-7045",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            db: "BID",
            id: "86900",
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   id: "VAR-200305-0033",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:40:38.585000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-287",
            trust: 1.1,
         },
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.kb.cert.org/vuls/id/443257",
         },
         {
            trust: 2,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.",
         },
         {
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml",
         },
         {
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml#details",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            db: "BID",
            id: "86900",
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            db: "BID",
            id: "86900",
         },
         {
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2003-05-05T00:00:00",
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            date: "2003-05-12T00:00:00",
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            date: "2003-05-12T00:00:00",
            db: "BID",
            id: "86900",
         },
         {
            date: "2003-05-12T04:00:00",
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            date: "2003-05-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-02-23T00:00:00",
            db: "CERT/CC",
            id: "VU#443257",
         },
         {
            date: "2008-09-10T00:00:00",
            db: "VULHUB",
            id: "VHN-7045",
         },
         {
            date: "2003-05-12T00:00:00",
            db: "BID",
            id: "86900",
         },
         {
            date: "2008-09-10T19:18:16.663000",
            db: "NVD",
            id: "CVE-2003-0216",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst switches allow access to \"enable mode\" without password",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#443257",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200305-037",
         },
      ],
      trust: 0.6,
   },
}

var-200609-0179
Vulnerability from variot

The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context. Cisco IOS fails to properly verify the VTP configuration revision number. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Cisco IOS Is VLAN Trunk protocol (VTP) There are several security issues in the implementation of: 1) VTP Included in packet VTP There is a flaw in the processing of the version field, so if an inappropriate value is set, the processing will go into a loop and the device will be reset. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. Cisco IOS is prone to multiple vulnerabilities when handling VLAN Trunking Protocol (VTP) packets. These issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. Attackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. By exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. Cisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. From this point on the switch cannot communicate with the changed VLAN configuration, as all other switches will reject the generated update, 3 VLAN name heap overflow If an attacker is able to send VTP updates to the Cisco IOS device, type 2 frames contain record of. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name. If the updated VLAN name is larger than 100 bytes and the VLAN name length field is correct, it will cause a heap overflow and execute arbitrary code on the receiving switch.


Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.

Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/


TITLE: Cisco IOS VTP Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA21896

VERIFY ADVISORY: http://secunia.com/advisories/21896/

CRITICAL: Moderately critical

IMPACT: Manipulation of data, DoS, System access

WHERE:

From local network

OPERATING SYSTEM: Cisco IOS 10.x http://secunia.com/product/184/ Cisco IOS 11.x http://secunia.com/product/183/ Cisco IOS 12.x http://secunia.com/product/182/ Cisco IOS R11.x http://secunia.com/product/53/ Cisco IOS R12.x http://secunia.com/product/50/

DESCRIPTION: FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. This can be exploited to reset the switch with a Software Forced Crash Exception by sending a specially crafted packet to a trunk enabled port.

2) An integer overflow error exists in the VTP configuration revision handling.

3) A boundary error exists in the processing of VTP summary advertisement messages. This can be exploited to cause a heap-based buffer overflow by sending a specially crafted message containing an overly long VLAN name (more than 100 characters) to a trunk enabled port.

NOTE: The packets must be received with a matching domain name and a matching VTP domain password (if configured).

SOLUTION: A fix is reportedly available for vulnerability #1. The vendor also recommends applying a VTP domain password to the VTP domain (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: FX, Phenoelit.

ORIGINAL ADVISORY: Phenoelit: http://www.phenoelit.de/stuff/CiscoVTP.txt

Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0179",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 1.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.1\\(19\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(19)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FX fx@phenoelit.de",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2006-4775",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.8,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2006-4775",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-20883",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2006-4775",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#542108",
                  trust: 0.8,
                  value: "22.74",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#175148",
                  trust: 0.8,
                  value: "3.37",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200609-238",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-20883",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context. Cisco IOS fails to properly verify the VTP configuration revision number. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Cisco IOS Is VLAN Trunk protocol (VTP) There are several security issues in the implementation of: 1) VTP Included in packet VTP There is a flaw in the processing of the version field, so if an inappropriate value is set, the processing will go into a loop and the device will be reset. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. Cisco IOS is prone to multiple vulnerabilities when handling VLAN Trunking Protocol (VTP) packets. \nThese issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. \nAttackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. \nBy exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. \nCisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. From this point on the switch cannot communicate with the changed VLAN configuration, as all other switches will reject the generated update, 3 VLAN name heap overflow If an attacker is able to send VTP updates to the Cisco IOS device, type 2 frames contain record of. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name. If the updated VLAN name is larger than 100 bytes and the VLAN name length field is correct, it will cause a heap overflow and execute arbitrary code on the receiving switch. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco IOS VTP Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA21896\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21896/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nManipulation of data, DoS, System access\n\nWHERE:\n>From local network\n\nOPERATING SYSTEM:\nCisco IOS 10.x\nhttp://secunia.com/product/184/\nCisco IOS 11.x\nhttp://secunia.com/product/183/\nCisco IOS 12.x\nhttp://secunia.com/product/182/\nCisco IOS R11.x\nhttp://secunia.com/product/53/\nCisco IOS R12.x\nhttp://secunia.com/product/50/\n\nDESCRIPTION:\nFX has reported some vulnerabilities in Cisco IOS, which can be\nexploited by malicious people to cause a DoS (Denial of Service) and\npotentially to compromise a vulnerable network device. This can be exploited to reset the switch\nwith a Software Forced Crash Exception by sending a specially crafted\npacket to a trunk enabled port. \n\n2) An integer overflow error exists in the VTP configuration revision\nhandling. \n\n3) A boundary error exists in the processing of VTP summary\nadvertisement messages. This can be exploited to cause a heap-based\nbuffer overflow by sending a specially crafted message containing an\noverly long VLAN name (more than 100 characters) to a trunk enabled\nport. \n\nNOTE: The packets must be received with a matching domain name and a\nmatching VTP domain password (if configured). \n\nSOLUTION:\nA fix is reportedly available for vulnerability #1. The vendor also\nrecommends applying a VTP domain password to the VTP domain (see the\nvendor's advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nFX, Phenoelit. \n\nORIGINAL ADVISORY:\nPhenoelit:\nhttp://www.phenoelit.de/stuff/CiscoVTP.txt\n\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
      ],
      trust: 3.6,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SECUNIA",
            id: "21896",
            trust: 3.4,
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
            trust: 3.3,
         },
         {
            db: "BID",
            id: "19998",
            trust: 2.8,
         },
         {
            db: "SECUNIA",
            id: "21902",
            trust: 2.6,
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
            trust: 2.5,
         },
         {
            db: "VUPEN",
            id: "ADV-2006-3600",
            trust: 1.7,
         },
         {
            db: "OSVDB",
            id: "28776",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1016843",
            trust: 1.7,
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
            trust: 0.7,
         },
         {
            db: "BUGTRAQ",
            id: "20060913 RE: CISCO IOS VTP ISSUES",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20060913 CISCO IOS VTP ISSUES",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20060913 CISCO VLAN TRUNKING PROTOCOL VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "28925",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-20883",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "50047",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "50048",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   id: "VAR-200609-0179",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:10:33.122000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sr-20060913-vtp",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
         },
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/19998",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/175148",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/21896/",
         },
         {
            trust: 1.8,
            url: "http://www.phenoelit.de/stuff/ciscovtp.txt",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/28776",
         },
         {
            trust: 1.7,
            url: "http://securitytracker.com/id?1016843",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/21896",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/21902",
         },
         {
            trust: 1.6,
            url: "http://www.phenoelit.de/stuff/ciscovtp.txt ",
         },
         {
            trust: 1.6,
            url: "http://www.cisco.com/en/us/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml#wp998892",
         },
         {
            trust: 1.4,
            url: "http://www.frsirt.com/english/advisories/2006/3600",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2006/3600",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925",
         },
         {
            trust: 0.9,
            url: "http://secunia.com/advisories/21902/",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4775",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4775",
         },
         {
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/821420",
         },
         {
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/542108",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/445938/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/445896/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/28925",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/public/sw-center/sw-ios.shtml",
         },
         {
            trust: 0.3,
            url: "/archive/1/445896",
         },
         {
            trust: 0.3,
            url: "/archive/1/445938",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/quality_assurance_analyst/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/hardcore_disassembler_and_reverse_engineer/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/web_application_security_specialist/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/184/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/53/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/182/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/183/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/527/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/3564/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/185/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/526/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            date: "2006-09-14T00:00:00",
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            date: "2006-09-13T00:00:00",
            db: "BID",
            id: "19998",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            date: "2006-09-14T22:28:53",
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            date: "2006-09-14T22:28:53",
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            date: "2006-09-14T00:07:00",
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            date: "2006-09-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            date: "2018-10-17T00:00:00",
            db: "VULHUB",
            id: "VHN-20883",
         },
         {
            date: "2006-09-14T18:47:00",
            db: "BID",
            id: "19998",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2006-000552",
         },
         {
            date: "2018-10-17T21:39:30.903000",
            db: "NVD",
            id: "CVE-2006-4775",
         },
         {
            date: "2006-09-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS contains buffer overflow in VTP VLAN name handling",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-238",
         },
      ],
      trust: 0.6,
   },
}

var-200004-0027
Vulnerability from variot

Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password. This can be done either from the console itself or via a remote Telnet session

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200004-0027",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4.1",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This vulnerability was announced by Cisco in a security advisory posted to the Bugtraq mailing list on April 19, 2000.\n\n The Cisco BugID for this issue is:\n\nCSCdr10025",
      sources: [
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2000-0267",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: true,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-1846",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2000-0267",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200004-054",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-1846",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1846",
         },
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password. \nThis can be done either from the console itself or via a remote Telnet session",
      sources: [
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "VULHUB",
            id: "VHN-1846",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "1122",
            trust: 2,
         },
         {
            db: "OSVDB",
            id: "1288",
            trust: 1.7,
         },
         {
            db: "NVD",
            id: "CVE-2000-0267",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20000419 CISCO CATALYST ENABLE PASSWORD BYPASS VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-1846",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1846",
         },
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   id: "VAR-200004-0027",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1846",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T12:13:45.488000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/1122",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/1288",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/sec_incident_response.shtml",
         },
         {
            trust: 0.1,
            url: "",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-1846",
         },
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-1846",
         },
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2000-04-20T00:00:00",
            db: "VULHUB",
            id: "VHN-1846",
         },
         {
            date: "2000-04-20T00:00:00",
            db: "BID",
            id: "1122",
         },
         {
            date: "2000-04-20T04:00:00",
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            date: "2000-04-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-09-10T00:00:00",
            db: "VULHUB",
            id: "VHN-1846",
         },
         {
            date: "2000-04-20T00:00:00",
            db: "BID",
            id: "1122",
         },
         {
            date: "2008-09-10T19:03:47.807000",
            db: "NVD",
            id: "CVE-2000-0267",
         },
         {
            date: "2005-10-12T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst Enable Password Bypass Vulnerability",
      sources: [
         {
            db: "BID",
            id: "1122",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
      trust: 0.9,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "access verification error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200004-054",
         },
      ],
      trust: 0.6,
   },
}

var-200811-0138
Vulnerability from variot

Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port. Cisco IOS and CatOS are prone to a remote denial-of-service vulnerability. An attacker can exploit this issue to cause affected devices to restart, effectively denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCsv05934 and CSCsv11741. ----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/


TITLE: Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability

SECUNIA ADVISORY ID: SA32573

VERIFY ADVISORY: http://secunia.com/advisories/32573/

CRITICAL: Less critical

IMPACT: DoS

WHERE:

From local network

OPERATING SYSTEM: Cisco Catalyst 6500 Series 12.x http://secunia.com/advisories/product/15864/ Cisco CATOS 5.x http://secunia.com/advisories/product/526/ Cisco CATOS 6.x http://secunia.com/advisories/product/527/ Cisco CATOS 7.x http://secunia.com/advisories/product/185/ Cisco CATOS 8.x http://secunia.com/advisories/product/3564/ Cisco IOS 10.x http://secunia.com/advisories/product/184/ Cisco IOS 11.x http://secunia.com/advisories/product/183/ Cisco IOS 12.x http://secunia.com/advisories/product/182/ Cisco IOS R11.x http://secunia.com/advisories/product/53/ Cisco IOS R12.x http://secunia.com/advisories/product/50/ Cisco IOS XR 3.x http://secunia.com/advisories/product/4907/

DESCRIPTION: A vulnerability has been reported in Cisco IOS/CatOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an unspecified error in the handling of VLAN Trunking Protocol (VTP) packets.

Successful exploitation requires that "VTP Operating Mode" is set to "server" or "client".

SOLUTION: Apply configuration best practices to limit exposure to exploitation (please see the vendor advisory for details).

PROVIDED AND/OR DISCOVERED BY: The vendor credits showrun.lee.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200811-0138",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios 12.4",
            scope: null,
            trust: 11.7,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0",
            scope: null,
            trust: 6.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s",
            scope: null,
            trust: 5.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1",
            scope: null,
            trust: 5.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 w5",
            scope: null,
            trust: 4.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e",
            scope: null,
            trust: 4.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3",
            scope: null,
            trust: 4.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2",
            scope: null,
            trust: 3.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e1",
            scope: null,
            trust: 3.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s1",
            scope: null,
            trust: 3.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 3.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "ios 12.1 ex",
            scope: null,
            trust: 2.7,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1",
            scope: null,
            trust: 2.7,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s6",
            scope: null,
            trust: 2.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "ios 12.1 e3",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s3",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s5",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s4",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e8",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s8",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e4",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s7",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 mr",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1a",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t2",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t4",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s2",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: null,
            trust: 1.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: null,
            trust: 1.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "ios 12.4 t7",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t1",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e12",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 t",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 dc2",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e7",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t6",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e5",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "ios 12.1 ey",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "ios 12.1 db1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "12.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "ios 12.1 e2",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e14",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1b",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos glx",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "ios 12.4 t3",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 dc",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew4",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t4",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st6",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "4.5",
         },
         {
            model: "ios 12.3 t8",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e6",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e9",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "ios 12.0 sx",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t7",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 p",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 sa6",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da9",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos 8.4 glx",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eb2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t8",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.0",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t10",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t11",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2b",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xk",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "12.0.7",
         },
         {
            model: "ios 12.0 sy",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 sw1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "ios 12.2 t14",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 aa",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1c",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xk2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ja1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sc",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc9",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ja1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st7",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s10",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm4",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe?",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ja",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xu",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 t2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e10",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 xa",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t9",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s5a",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t10",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t8",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t9",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eb",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "router series",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "18xx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "ios 12.2sl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ca",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.7",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(5)",
         },
         {
            model: "ios 12.1xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.3.3",
         },
         {
            model: "ios 12.3yn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 da3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3ha",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(1)",
         },
         {
            model: "ios 12.1 ey3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s8a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(18)",
         },
         {
            model: "ios 12.1 ex3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(18)",
         },
         {
            model: "ios 12.3 xx2d",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(11)",
         },
         {
            model: "ios 11.1 ct",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19.2)",
         },
         {
            model: "ios 12.4 xc7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4",
         },
         {
            model: "ios 12.0sv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios aa",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.7",
         },
         {
            model: "ios 12.1 eb1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sp1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xf",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios 12.3 xi4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2sa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xe",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios 12.4 xd6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(14)",
         },
         {
            model: "ios 12.2 da4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(14.5)",
         },
         {
            model: "ios 12.3jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "hsrp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2500.0",
         },
         {
            model: "ios 12.3 xq1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc3b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(19)",
         },
         {
            model: "ios 12.2bx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(18.4)",
         },
         {
            model: "ios 12.2 bc2i",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(17)",
         },
         {
            model: "ios 12.2 bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0st",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xi2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2seg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0",
         },
         {
            model: "ios 12.2seb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 ya1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2)",
         },
         {
            model: "ios 12.4 sw3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios t2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.3",
         },
         {
            model: "ios 12.1yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xw6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(6)",
         },
         {
            model: "ios 12.2 xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.4.2",
         },
         {
            model: "ios 12.1 ye4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xc",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios 12.0xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(11)",
         },
         {
            model: "ios 12.0 dc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3",
         },
         {
            model: "ios 12.2bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xz2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.10s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "ios zw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(14)",
         },
         {
            model: "ios 12.1xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2p",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xe4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 gs0.2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(21)",
         },
         {
            model: "ios 12.3yt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jk1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(9)",
         },
         {
            model: "ios 12.4 xy4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3)",
         },
         {
            model: "ios 12.0 sv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xf1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ca",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios 12.3 yi1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(1)",
         },
         {
            model: "ios 12.4 mr1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jea3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(1)",
         },
         {
            model: "ios 12.3va",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ga",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "ios 12.0 sy5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(12)",
         },
         {
            model: "ios 12.4 xz1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(6)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.0",
         },
         {
            model: "ios 12.2eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "ios 12.2 ze",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios aa",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios 12.3bw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "ios 12.2 da3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.10",
         },
         {
            model: "ios 12.3t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t17",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2i",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ios 12.4xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ia",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.16",
         },
         {
            model: "ios seb3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2.2",
         },
         {
            model: "ios 12.0ev",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(15)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13.5)",
         },
         {
            model: "ios 12.4 xe3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(4)",
         },
         {
            model: "ios 12.4 t10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 md4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(16)",
         },
         {
            model: "ios xa3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios 12.4 xe2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xd8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(5)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(1)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv5",
         },
         {
            model: "ios 12.1 e20",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(2)",
         },
         {
            model: "ios 12.0 sl2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(13)",
         },
         {
            model: "ios 12.3yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(4)",
         },
         {
            model: "ios 12.0sc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xy5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sca",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sef",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0w",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xm1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(17)",
         },
         {
            model: "ios 12.0 wt6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xd",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios 12.1xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 p2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(20.3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(9)",
         },
         {
            model: "ios 12.1 e16",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(15)",
         },
         {
            model: "ios 12.2 zh3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(2)",
         },
         {
            model: "ios 12.2 s19",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(18)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(16)",
         },
         {
            model: "ios 12.4xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios 12.0 w5-32a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(8)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(12)",
         },
         {
            model: "ios 12.0 w5-27d",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.4.3",
         },
         {
            model: "ios 12.3 yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "ios 12.0 xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv4",
         },
         {
            model: "ios 12.2 da2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yx1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.4",
         },
         {
            model: "ios 12.2cz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(11)",
         },
         {
            model: "ios 12.0 sc3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(8)",
         },
         {
            model: "ios fz",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 12.4 xc6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ia",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.9",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.3",
         },
         {
            model: "ios 12.1 ea8a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(5)",
         },
         {
            model: "ios 12.3ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2srb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(2)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0xv",
         },
         {
            model: "ios 11.1 cc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wx5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(2)",
         },
         {
            model: "catos deferred",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)-",
         },
         {
            model: "ios 12.2 jk5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "ios 12.0 wc 2900xl-lre",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yh3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3700",
         },
         {
            model: "ios 12.0 wc10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(11)",
         },
         {
            model: "ios 12.3yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e18",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1gb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0(7)",
         },
         {
            model: "ios 12.2 xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sy7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2gs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s14",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xs1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(12)",
         },
         {
            model: "ios 12.0 xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e17",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3800",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(13)",
         },
         {
            model: "ios 12.3yx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ia",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(12)",
         },
         {
            model: "ios 12.1xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2by",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 t2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2m",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xd11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "ios 12.1 xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.17",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(1)",
         },
         {
            model: "ios ia",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ios 12.1ec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.19",
         },
         {
            model: "ios 12.0da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 t1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.6",
         },
         {
            model: "ios 12.0 t3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(8)",
         },
         {
            model: "ios 12.2ez",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(1)",
         },
         {
            model: "ios t",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios 12.0xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ct",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.17",
         },
         {
            model: "ios 12.4xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xb6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 sw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xy6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1xx",
         },
         {
            model: "ios bc",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.10",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.16",
         },
         {
            model: "ios 12.4 xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios aa",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.16",
         },
         {
            model: "ios 12.2fy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2pb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "ios 12.2ixd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.7",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "ios 12.2jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(2)",
         },
         {
            model: "ios 12.2 da13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jmc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios 12.2 t13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 da1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xi8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios -7-ja2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3",
         },
         {
            model: "ios bt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.17",
         },
         {
            model: "ios 12.0 st4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2fz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(3)",
         },
         {
            model: "ios 12.3 yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ez",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2irb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1ca",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios w",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(3)",
         },
         {
            model: "ios 12.3xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios p",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.9",
         },
         {
            model: "ios 12.0 w5-30b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios f1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.4",
         },
         {
            model: "ios 12.1 yd6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(5)",
         },
         {
            model: "ios 12.1 xr2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(22)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "ios 12.1xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(17)",
         },
         {
            model: "ios 12.2 s18",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi8a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sed",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4md",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(27)",
         },
         {
            model: "ios 12.1eb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xw7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 fc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "ios f",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.4",
         },
         {
            model: "ios 12.3xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(7)",
         },
         {
            model: "ios 12.1 ea8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)",
         },
         {
            model: "ios 12.4xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 md1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1az",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios 12.1 ay",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(21)",
         },
         {
            model: "ios 12.2sga",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(27)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(12)",
         },
         {
            model: "ios cc",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.17",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(8)",
         },
         {
            model: "ios 12.2 xd3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xu1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(11)",
         },
         {
            model: "ios 12.2mc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea5a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(7)",
         },
         {
            model: "ios 12.3 yg7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 pi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(4)",
         },
         {
            model: "ios 12.2 yv1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ey",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.20.3",
         },
         {
            model: "ios 12.4 xw1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2su",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t12",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xt3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 da2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea10a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19)",
         },
         {
            model: "ios 12.2 mc2j",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "ios 12.2 s15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios bt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.12",
         },
         {
            model: "ios 11.3db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ca",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(2)",
         },
         {
            model: "ios 12.3 xr7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xn1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios 12.2sh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 da3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ya1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2pi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ew",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "ios 12.1 yb5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ev01",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sl1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios aa",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios 12.2 xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xs2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 ja2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios zu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(13)",
         },
         {
            model: "ios zx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 11.2 bc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xd10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios 12.0 wx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1m",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ay1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(8)",
         },
         {
            model: "ios 12.2 sx1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc3c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 cz3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(10)",
         },
         {
            model: "ios 12.2 zj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yp1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xk3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(1)",
         },
         {
            model: "ios 12.3xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(28)",
         },
         {
            model: "ios 12.0xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(1)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(16)",
         },
         {
            model: "ios 12.2 zh9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos clr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(7)",
         },
         {
            model: "ios 12.1 bc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s4a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(4)",
         },
         {
            model: "ios 12.0 sv2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3ma",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(3)",
         },
         {
            model: "ios 12.3 b5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "management agents for tru64 unix",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "6.4(10)",
         },
         {
            model: "ios 12.1x",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jma",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yz2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "ios 12.2ixa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(2)",
         },
         {
            model: "ios 12.2cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ay",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xy4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "ios 11.2f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(14)",
         },
         {
            model: "ios t",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.1",
         },
         {
            model: "ios 12.2svd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(24)",
         },
         {
            model: "ios 12.3xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(4)",
         },
         {
            model: "ios 12.0 xm1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xt2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ey",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2src",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(2)",
         },
         {
            model: "ios 12.1 xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(5)",
         },
         {
            model: "ios 12.2 za2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos sa6",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "ios 12.2dd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios t",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4",
         },
         {
            model: "ios 12.3 xr3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios s",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios 12.0xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 za8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0w5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(18)",
         },
         {
            model: "ios 12.3 bc7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xg3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sgb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(18)",
         },
         {
            model: "ios 12.4 t11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "ios 12.2svc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(10)",
         },
         {
            model: "ios 12.4 xb10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 yb4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(8)",
         },
         {
            model: "ios 12.2 zy2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(4)",
         },
         {
            model: "ios 12.2 s16",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
         {
            model: "ios 12.4jmb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2so",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xp4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "ios 12.3 xr8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1xv",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "ios 12.1ev",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(8)",
         },
         {
            model: "ios 12.3 t12",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1ia",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4mr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xg",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios 12.0xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(7)",
         },
         {
            model: "ios 12.2sa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ya2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "ios 12.1 ye1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4xv",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(7)",
         },
         {
            model: "ios 12.2see",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(9)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(12)",
         },
         {
            model: "ios 12.1 ex2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xf5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xg2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 mr2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 gs6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2dx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 md",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 dx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "ios 11.1 cc4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 jk4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ez1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(12.05)",
         },
         {
            model: "ios 12.3 yg1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sy4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(22)",
         },
         {
            model: "ios 12.1 yi1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.16",
         },
         {
            model: "ios 12.2 bc2f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv1",
         },
         {
            model: "ios 12.1 t8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(3)",
         },
         {
            model: "ios 12.2 zk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios 12.1 ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(7.7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "ios 12.1yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.12",
         },
         {
            model: "ios 12.0 t8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5.3)",
         },
         {
            model: "ios 12.1dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16.2)",
         },
         {
            model: "ios 12.0sl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "ios 12.3 yi3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sv1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2h",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xz7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t16",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea4a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13)",
         },
         {
            model: "ios 11.3 db2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xl2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ew",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(5)",
         },
         {
            model: "ios 12.3yr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4sw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(3.2)",
         },
         {
            model: "ios 11.3da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios ed",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.1",
         },
         {
            model: "ios 12.0 sfx4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(16)",
         },
         {
            model: "ios 12.4 xb2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios b",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.11",
         },
         {
            model: "ios 12.2dza",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "ios 12.3ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(14)",
         },
         {
            model: "ios 12.2 zh6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios xa",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.9",
         },
         {
            model: "ios 12.0 sz4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xr4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(1)",
         },
         {
            model: "ios 12.1 xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(6)",
         },
         {
            model: "ios 1.22 sxh3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi10a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(15)",
         },
         {
            model: "ios 12.3xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(3)",
         },
         {
            model: "ios 12.2 da8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1ct",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 xaf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(3)",
         },
         {
            model: "ios 12.1yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(20)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "ios 12.2 zl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(26)",
         },
         {
            model: "ios 12.2 s13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 jk2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios a",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.19",
         },
         {
            model: "ios 12.4xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(9)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3xx",
         },
         {
            model: "ios 12.1 t5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 t9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3xv",
         },
         {
            model: "ios 12.0db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(17)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(9)",
         },
         {
            model: "ios 12.0sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
         {
            model: "ios 12.3b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy03",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(1)",
         },
         {
            model: "ios 12.0 wc17",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(16)",
         },
         {
            model: "ios 12.3 bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(5)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(5)",
         },
         {
            model: "ios 12.0s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xf4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 12.4 xj4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(20)",
         },
         {
            model: "ios 12.0 wc13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios 12.1 ea1d",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(2)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "ios 12.0 t1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(73)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(10)",
         },
         {
            model: "ios 12.1 t10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sra",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xs?",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1sec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(4)",
         },
         {
            model: "ios sa3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios 12.3 xr6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2wa4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(1)",
         },
         {
            model: "ios 12.1xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(11)",
         },
         {
            model: "ios 12.2cy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(6)",
         },
         {
            model: "ios 12.4 xj2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)",
         },
         {
            model: "ios 12.3xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(9)",
         },
         {
            model: "ios 12.0 s9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t12",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(5)",
         },
         {
            model: "ios 12.2 s1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.3.4",
         },
         {
            model: "ios 12.1cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "ios 12.3 tpc11a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xt2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos ea1c",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios 12.4 xt1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2wa3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xq1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0x",
         },
         {
            model: "ios 12.1 t4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.6(1)",
         },
         {
            model: "ios 12.2 xd1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ez2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ym",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(14)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "ios 12.2 su2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(6)",
         },
         {
            model: "ios 12.2sec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2fx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(12)",
         },
         {
            model: "ios 12.0xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 t2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xj5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 aa4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 ta4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "ios 12.3xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(20)",
         },
         {
            model: "ios 12.3yq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xe1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(7)",
         },
         {
            model: "ios 12.3za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(11.1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3(1)",
         },
         {
            model: "ios 12.1 xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ca2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(6)",
         },
         {
            model: "ios 11.1aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ex4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xy6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3wa4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sbc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(7)",
         },
         {
            model: "ios 12.0 xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yb4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(1)",
         },
         {
            model: "ios xb",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios 11.3 db1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xu2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ewa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xg5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(7)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "ios 12.3xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(1)",
         },
         {
            model: "ios 12.2ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios sa1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios 12.4.13a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(1.1)",
         },
         {
            model: "ios 12.4ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios p",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(7)xv",
         },
         {
            model: "ios 12.1 yd2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "ios 12.3 yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0(18)",
         },
         {
            model: "ios 12.4 xy3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "ios 12.1eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s2a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jeb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(4)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(18)",
         },
         {
            model: "ios 12.1yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xl2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(10)",
         },
         {
            model: "ios 12.0sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea12",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s3b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 xd7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2se",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1eo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3na",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc2h",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ca4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(3)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(3)",
         },
         {
            model: "ios 12.4 xd5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 p5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos cv",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "ios 12.1ax",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ye6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc2b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(2)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(19)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "ios 12.2sva",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos gdr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(8)-",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.4(11)xv",
         },
         {
            model: "ios 12.1xo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "ios 12.4ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(4)",
         },
         {
            model: "ios ia",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios 12.1t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4jl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 aa1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(3)",
         },
         {
            model: "ios 12.4 xw9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "hsrp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2600.0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(2)",
         },
         {
            model: "ios 12.0 db2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3tpc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios sa5",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "catos wc8",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "ios 11.2xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1cc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(1)",
         },
         {
            model: "ios 12.2 t11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "hsrp",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3600.0",
         },
         {
            model: "ios 12.3 yg5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1)",
         },
         {
            model: "ios 12.2 xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "32120",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "showrun.lee",
      sources: [
         {
            db: "BID",
            id: "32120",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2008-4963",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2008-4963",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-35088",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2008-4963",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200811-107",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-35088",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port. Cisco IOS and CatOS are prone to a remote denial-of-service vulnerability. \nAn attacker can exploit this issue to cause affected devices to restart, effectively denying service to legitimate users. \nThis issue is being tracked by Cisco Bug IDs CSCsv05934 and CSCsv11741. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco IOS / CatOS VLAN Trunking Protocol Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32573\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32573/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n>From local network\n\nOPERATING SYSTEM:\nCisco Catalyst 6500 Series 12.x\nhttp://secunia.com/advisories/product/15864/\nCisco CATOS 5.x\nhttp://secunia.com/advisories/product/526/\nCisco CATOS 6.x\nhttp://secunia.com/advisories/product/527/\nCisco CATOS 7.x\nhttp://secunia.com/advisories/product/185/\nCisco CATOS 8.x\nhttp://secunia.com/advisories/product/3564/\nCisco IOS 10.x\nhttp://secunia.com/advisories/product/184/\nCisco IOS 11.x\nhttp://secunia.com/advisories/product/183/\nCisco IOS 12.x\nhttp://secunia.com/advisories/product/182/\nCisco IOS R11.x\nhttp://secunia.com/advisories/product/53/\nCisco IOS R12.x\nhttp://secunia.com/advisories/product/50/\nCisco IOS XR 3.x\nhttp://secunia.com/advisories/product/4907/\n\nDESCRIPTION:\nA vulnerability has been reported in Cisco IOS/CatOS, which can be\nexploited by malicious people to cause a DoS (Denial of Service). \n\nThe vulnerability is caused due to an unspecified error in the\nhandling of VLAN Trunking Protocol (VTP) packets. \n\nSuccessful exploitation requires that \"VTP Operating Mode\" is set to\n\"server\" or \"client\". \n\nSOLUTION:\nApply configuration best practices to limit exposure to exploitation\n(please see the vendor advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits showrun.lee. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            db: "BID",
            id: "32120",
         },
         {
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            db: "PACKETSTORM",
            id: "71641",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "32120",
            trust: 2.8,
         },
         {
            db: "NVD",
            id: "CVE-2008-4963",
            trust: 2.8,
         },
         {
            db: "SECUNIA",
            id: "32573",
            trust: 2.6,
         },
         {
            db: "OSVDB",
            id: "49601",
            trust: 2.5,
         },
         {
            db: "SECTRACK",
            id: "1021144",
            trust: 2.5,
         },
         {
            db: "SECTRACK",
            id: "1021143",
            trust: 2.5,
         },
         {
            db: "XF",
            id: "46346",
            trust: 1.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20081105 CISCO VLAN TRUNKING PROTOCOL VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-35088",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "71641",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            db: "BID",
            id: "32120",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            db: "PACKETSTORM",
            id: "71641",
         },
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   id: "VAR-200811-0138",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-35088",
         },
      ],
      trust: 0.6633348633333334,
   },
   last_update_date: "2023-12-18T12:23:04.623000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sr-20081105-vtp",
            trust: 0.8,
            url: "http://www.cisco.com/en/us/products/products_security_response09186a0080a231cf.html",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/32120",
         },
         {
            trust: 2.5,
            url: "http://osvdb.org/49601",
         },
         {
            trust: 2.5,
            url: "http://securitytracker.com/id?1021143",
         },
         {
            trust: 2.5,
            url: "http://www.securitytracker.com/id?1021144",
         },
         {
            trust: 2.5,
            url: "http://secunia.com/advisories/32573",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/en/us/products/products_security_response09186a0080a231cf.html",
         },
         {
            trust: 1.4,
            url: "http://xforce.iss.net/xforce/xfdb/46346",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4963",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4963",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml#status",
         },
         {
            trust: 0.3,
            url: "/archive/1/500067",
         },
         {
            trust: 0.3,
            url: "/archive/1/500066",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/183/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/182/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/binary_analysis/sample_analysis/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/184/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/32573/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/3564/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/53/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/secunia_security_advisories/",
         },
         {
            trust: 0.1,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20081105-vtp.shtml",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/527/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/15864/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/526/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/4907/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/185/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/about_secunia_advisories/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            db: "BID",
            id: "32120",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            db: "PACKETSTORM",
            id: "71641",
         },
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            db: "BID",
            id: "32120",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            db: "PACKETSTORM",
            id: "71641",
         },
         {
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-11-06T00:00:00",
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            date: "2008-11-05T00:00:00",
            db: "BID",
            id: "32120",
         },
         {
            date: "2009-02-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            date: "2008-11-07T00:50:21",
            db: "PACKETSTORM",
            id: "71641",
         },
         {
            date: "2008-11-06T15:55:51.713000",
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            date: "2008-11-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-08-08T00:00:00",
            db: "VULHUB",
            id: "VHN-35088",
         },
         {
            date: "2015-04-16T17:51:00",
            db: "BID",
            id: "32120",
         },
         {
            date: "2009-02-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
         {
            date: "2017-08-08T01:33:01.297000",
            db: "NVD",
            id: "CVE-2008-4963",
         },
         {
            date: "2009-03-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS and  CatOS In  VTP Interfering with service operations related to packet processing  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2008-002256",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200811-107",
         },
      ],
      trust: 0.6,
   },
}

var-200408-0130
Vulnerability from variot

Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack.". A vulnerability in Cisco CatOS may allow a remote attacker to cause a denial of service on an affected device. Cisco CatOS 5.x versions prior to 5.5(20) through 8.x versions prior to 8.2(2) and 8.3(2)GLX are vulnerable

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200408-0130",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.1\\(1a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(2\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.1\\(2a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.1\\(2b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(3\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(1\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(15\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(17\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(9\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.3glx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(5\\)",
         },
         {
            model: "catalyst 4912g",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(3\\)",
         },
         {
            model: "catalyst 2926gl",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.2\\(2\\)",
         },
         {
            model: "catalyst 2948-ge-tx",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(2a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(0.7\\)pan",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(6a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(12a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(3\\)csx",
         },
         {
            model: "catalyst 4500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(9\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1c\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.4\\(0.2\\)clr",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(1a\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 2926",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(7a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.4\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(3a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(11\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(13\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(8a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(6\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(12\\)",
         },
         {
            model: "catalyst 4510r",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 4000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(4a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(16.2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.2\\(1\\)",
         },
         {
            model: "catalyst 2948g-l3",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2.13\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(0.65\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(11\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(4\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(3a\\)",
         },
         {
            model: "catalyst 2902",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(8a\\)cv",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(10\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(13a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(10\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(3\\)x1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(5.10\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(4b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(2a\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(13.5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(1b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(0.110\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(7\\)",
         },
         {
            model: "catalyst 5000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(7\\)",
         },
         {
            model: "catalyst 2926t",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(7a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(10\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(2a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(12\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)deferred",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(12a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(3\\)x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(1\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.5\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1d\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.4\\(0.63\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(3a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(13a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(10\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(13\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.3\\(1\\)glx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(6a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(14\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(1\\)",
         },
         {
            model: "catalyst 2980g-a",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(10a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(9\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.3\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(4a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(14\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4\\(5a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(11\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(2\\)",
         },
         {
            model: "catalyst 2926gs",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 6000 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(12\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(3a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(18\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5.10",
         },
         {
            model: "catalyst 2980g",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(9\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(2a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(2a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(4b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(8.3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(4\\)",
         },
         {
            model: "catalyst 2926f",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1e\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(8\\)gdr",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(2a\\)",
         },
         {
            model: "catalyst 2901",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catalyst 4506",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(4a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "8.1\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.3\\(1\\)",
         },
         {
            model: "catalyst 4507r",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1a\\)",
         },
         {
            model: "catalyst 2948",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(2\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5\\)csx",
         },
         {
            model: "catalyst 6000 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(6a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(1b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.2\\(0.111\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(16\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.4\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.3\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(11a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(4b\\)",
         },
         {
            model: "catalyst 4503",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "6.1\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(19\\)",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.4\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(2\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13.5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.3\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.0\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.3\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(2b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.4\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.4\\(5a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(12a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(6a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\)deferred:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(10a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(14\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(15\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(7a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.3\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.3\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(6a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(3a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(3a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(3\\)x1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(3a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(8.3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(11a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(16\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(16.2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(8a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(8a\\)cv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1d\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1e\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(5.10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4\\(0.2\\)clr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.1\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:2.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:3.2\\(8\\)gdr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(14\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(7a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(12a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(17\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(18\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(3\\)x:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.2\\(0.65\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4\\(0.63\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.3\\(1\\)glx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.3glx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2902:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948g-l3:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2980g:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4912g:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_5000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(10\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2901:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2948-ge-tx:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4507r:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4510r:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2.13\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.110\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926f:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926gl:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2980g-a:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(12\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2\\(0.111\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3\\(0.7\\)pan:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926gs:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_2926t:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4503:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_4506:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
      ],
   },
   cve: "CVE-2004-0551",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-8981",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2004-0551",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#245190",
                  trust: 0.8,
                  value: "4.50",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200408-107",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-8981",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            db: "VULHUB",
            id: "VHN-8981",
         },
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\". A vulnerability in Cisco CatOS may allow a remote attacker to cause a denial of service on an affected device. Cisco CatOS 5.x versions prior to 5.5(20) through 8.x versions prior to 8.2(2) and 8.3(2)GLX are vulnerable",
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            db: "VULHUB",
            id: "VHN-8981",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#245190",
            trust: 2.5,
         },
         {
            db: "NVD",
            id: "CVE-2004-0551",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "16370",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20040609 CISCO CATOS TELNET, HTTP AND SSH VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "83156",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-8981",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            db: "VULHUB",
            id: "VHN-8981",
         },
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   id: "VAR-200408-0130",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-8981",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:53:46.947000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.kb.cert.org/vuls/id/245190",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370",
         },
         {
            trust: 0.8,
            url: "about vulnerability notes",
         },
         {
            trust: 0.8,
            url: "contact us about this vulnerability",
         },
         {
            trust: 0.8,
            url: "provide a vendor statement",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/16370",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            db: "VULHUB",
            id: "VHN-8981",
         },
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            db: "VULHUB",
            id: "VHN-8981",
         },
         {
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-06-15T00:00:00",
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            date: "2004-08-06T00:00:00",
            db: "VULHUB",
            id: "VHN-8981",
         },
         {
            date: "2004-08-06T04:00:00",
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            date: "2004-08-06T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-07-16T00:00:00",
            db: "CERT/CC",
            id: "VU#245190",
         },
         {
            date: "2017-07-11T00:00:00",
            db: "VULHUB",
            id: "VHN-8981",
         },
         {
            date: "2017-07-11T01:30:15.323000",
            db: "NVD",
            id: "CVE-2004-0551",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco CatOS TCP ACK handling vulnerability",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#245190",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "unknown",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200408-107",
         },
      ],
      trust: 0.6,
   },
}

var-200505-1328
Vulnerability from variot

Certain TCP implementations may allow a remote attacker to arbitrarily modify host timestamp values, leading to a denial-of-service condition. A denial-of-service vulnerability exists for the TCP RFC 1323. The issue resides in the Protection Against Wrapped Sequence Numbers (PAWS) technique that was included to increase overall TCP performance. When TCP 'timestamps' are enabled, both hosts at the endpoints of a TCP connection employ internal clocks to mark TCP headers with a 'timestamp' value. The issue manifests if an attacker transmits a sufficient TCP PAWS packet to a vulnerable computer. The attacker sets a large value as the packet timestamp. When the target computer processes this packet, the internal timer is updated to the large value that the attacker supplied. This causes all other valid packets that are received subsequent to an attack to be dropped, because they are deemed to be too old or invalid. This type of attack will effectively deny service for a target connection. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

============================================================================= FreeBSD-SA-05:15.tcp Security Advisory The FreeBSD Project

Topic: TCP connection stall denial of service

Category: core Module: inet Announced: 2005-06-29 Credits: Noritoshi Demizu Affects: All FreeBSD releases. Corrected: 2005-06-29 21:38:48 UTC (RELENG_5, 5.4-STABLE) 2005-06-29 21:41:03 UTC (RELENG_5_4, 5.4-RELEASE-p3) 2005-06-29 21:42:33 UTC (RELENG_5_3, 5.3-RELEASE-p17) 2005-06-29 21:43:42 UTC (RELENG_4, 4.11-STABLE) 2005-06-29 21:45:14 UTC (RELENG_4_11, 4.11-RELEASE-p11) 2005-06-29 21:46:15 UTC (RELENG_4_10, 4.10-RELEASE-p16) CVE Name: CAN-2005-0356, CAN-2005-2068

For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .

I. Background

The Transmission Control Protocol (TCP) of the TCP/IP protocol suite provides a connection-oriented, reliable, sequence-preserving data stream service. TCP packets with the SYN flag set are used during setup of new TCP connections.

II. Problem Description

Two problems have been discovered in the FreeBSD TCP stack.

First, when a TCP packets containing a timestamp is received, inadequate checking of sequence numbers is performed, allowing an attacker to artificially increase the internal "recent" timestamp for a connection.

Second, a TCP packet with the SYN flag set is accepted for established connections, allowing an attacker to overwrite certain TCP options.

III. Impact

Using either of the two problems an attacker with knowledge of the local and remote IP and port numbers associated with a connection can cause a denial of service situation by stalling the TCP connection. The stalled TCP connection my be closed after some time by the other host.

IV. Workaround

In some cases it may be possible to defend against these attacks by blocking the attack packets using a firewall. Packets used to effect either of these attacks would have spoofed source IP addresses.

V. Solution

Perform one of the following:

1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the RELENG_5_4, RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch dated after the correction date.

2) To patch your present system:

The following patches have been verified to apply to FreeBSD 4.10, 4.11, 5.3, and 5.4 systems.

a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.

[FreeBSD 4.x]

fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch

fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch.asc

[FreeBSD 5.x]

fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp.patch

fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp.patch.asc

b) Apply the patch.

cd /usr/src

patch < /path/to/patch

c) Recompile your kernel as described in and reboot the system.

VI. Correction details

The following list contains the revision numbers of each file that was corrected in FreeBSD.

Branch Revision Path


RELENG_4 src/sys/netinet/tcp_input.c 1.107.2.44 RELENG_4_11 src/UPDATING 1.73.2.91.2.12 src/sys/conf/newvers.sh 1.44.2.39.2.15 src/sys/netinet/tcp_input.c 1.107.2.41.4.3 RELENG_4_10 src/UPDATING 1.73.2.90.2.17 src/sys/conf/newvers.sh 1.44.2.34.2.18 src/sys/netinet/tcp_input.c 1.107.2.41.2.1 RELENG_5 src/sys/netinet/tcp_input.c 1.252.2.16 RELENG_5_4 src/UPDATING 1.342.2.24.2.12 src/sys/conf/newvers.sh 1.62.2.18.2.8 src/sys/netinet/tcp_input.c 1.252.2.14.2.1 RELENG_5_3 src/UPDATING 1.342.2.13.2.20 src/sys/conf/newvers.sh 1.62.2.15.2.22 src/sys/netinet/tcp_input.c 1.252.4.1


VII. References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0356 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2068 http://www.kb.cert.org/vuls/id/637934

The latest revision of this advisory is available at ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (FreeBSD)

iD8DBQFCwxe7FdaIBMps37IRAi39AJ9ss6PVEwloS4SlKEWi5S1hpHnzmACeJF7H rKmK2NtleJ98dTLWW4QLMn4= =6fBH -----END PGP SIGNATURE----- .


Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/


TITLE: Cisco Various Products TCP Timestamp Denial of Service

SECUNIA ADVISORY ID: SA15393

VERIFY ADVISORY: http://secunia.com/advisories/15393/

CRITICAL: Less critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: Cisco SN5400 Series Storage Routers http://secunia.com/product/2188/ Cisco MGX 8900 Series Multiservice Switches http://secunia.com/product/5117/ Cisco MGX 8800 Series Multiservice Switches http://secunia.com/product/5116/ Cisco MGX 8200 Series Edge Concentrators http://secunia.com/product/5115/ Cisco Content Services Switch 11000 Series (WebNS) http://secunia.com/product/1507/ Cisco Aironet 350 Series Access Point http://secunia.com/product/5114/ Cisco Aironet 1200 Series Access Point http://secunia.com/product/1929/

DESCRIPTION: A vulnerability has been reported in some Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service) on active TCP sessions.

The vulnerability is caused due to an error in the implementation of the TCP Timestamp option and can be exploited via specially crafted packets to cause a targeted TCP session to stall until it's reset.

Successful exploitation requires knowledge of IP address information of the source and destination of the TCP network connection.

The vulnerability affects the following products: * SN5400 series storage routers * CSS11000 series content services switches * AP350 and AP1200 series Access Points running VxWorks * MGX8200, MGX8800, and MGX8900 series WAN switches (only management interfaces)

SOLUTION: SN5400 series storage routers: The vulnerability has been addressed by CSCin85370.

CSS11000 series content services switches: The vulnerability has been addressed by CSCeh40395.

AP350 and AP1200 series Access Points: The vendor recommends upgrading APs running VxWorks to Cisco IOS.

MGX series WAN switches: The vulnerability has been documented by CSCeh85125 and CSCeh85130.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Noritoshi Demizu.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml

OTHER REFERENCES: US-CERT VU#637934: http://www.kb.cert.org/vuls/id/637934


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


.

For more information: SA14904

SOLUTION: Apply updated packages.

For more information: SA15393

The vulnerability affects all versions of CacheOS and SGOS.

SOLUTION: The vendor recommends disabling RFC1323 support until a patch is available

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200505-1328",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "avaya",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "blue coat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openbsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "redback",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "css11500 content services switch s",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.30",
         },
         {
            model: "css11500 content services switch s",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.20",
         },
         {
            model: "windows xp home sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.8",
         },
         {
            model: "intuity audix",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "secure acs solution engine",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "ciscoworks common services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "windows server enterprise edition itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "remote monitoring suite option",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure access control server",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "sn storage router sn5428-2-3.3.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "windows server enterprise edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows xp 64-bit edition",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "bigip",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "9.1",
         },
         {
            model: "ciscoworks access control list manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.6",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "4.10-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6.2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3.1",
         },
         {
            model: "ip contact center express",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.6.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "sn storage router sn5428-3.2.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.6",
         },
         {
            model: "networks callpilot 200i",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "windows server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows advanced server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "rtx1100",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "rfc tcp extensions for high performance",
            scope: "eq",
            trust: 0.3,
            vendor: "ietf",
            version: "1323:",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(4)",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3(1)",
         },
         {
            model: "windows server datacenter edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "secure acs solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "7.1.4",
         },
         {
            model: "-release/alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "ciscoworks vpn/security management solution",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows advanced server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2",
         },
         {
            model: "windows server datacenter edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks callpilot 703t",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "interactive response",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "windows datacenter server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "windows professional",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "css11000 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6",
         },
         {
            model: "-stablepre2001-07-20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "windows xp media center edition sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "intelligent contact manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "web collaboration option",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "networks wlan access point",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7220.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0.5",
         },
         {
            model: "networks optical metro",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "gs4000",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "windows xp 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows xp 64-bit edition version sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.3",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.6",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(2)",
         },
         {
            model: "windows server enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "sn5400 series storage routers",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "open server",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "6.0",
         },
         {
            model: "windows xp 64-bit edition version",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0.3",
         },
         {
            model: "unity server",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1624",
         },
         {
            model: "windows server standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2x",
         },
         {
            model: "networks optical metro",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5100",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "windows advanced server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(3)",
         },
         {
            model: "interactive voice response",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11150 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp tablet pc edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "sn storage router sn5428-2.5.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0.x",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82301.2.10",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "css11050 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "e-mail manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server web edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82501.2.10",
         },
         {
            model: "windows xp media center edition",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.2",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.4",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1.20)",
         },
         {
            model: "mgx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "css11506 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows datacenter server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3x",
         },
         {
            model: "ciscoworks cd1 5th edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0.1",
         },
         {
            model: "coat systems sgos",
            scope: null,
            trust: 0.3,
            vendor: "blue",
            version: null,
         },
         {
            model: "-stablepre2002-03-07",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1.1",
         },
         {
            model: "windows advanced server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6.1",
         },
         {
            model: "windows xp embedded",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(2)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3",
         },
         {
            model: "networks universal signaling point compact/lite",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.x",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.x",
         },
         {
            model: "windows professional sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "networks srg",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1.0",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4(1)",
         },
         {
            model: "secure acs solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "ip contact center enterprise",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.42",
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "cvlan",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "networks ax7800r",
            scope: null,
            trust: 0.3,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "windows xp home",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2",
         },
         {
            model: "windows server web edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows professional sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.1",
         },
         {
            model: "windows server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows advanced server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "ap350",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "rtx1500",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "secure acs for windows server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "ciscoworks lms",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "networks communications server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1000",
         },
         {
            model: "ciscoworks access control list manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4x",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(3)",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "networks bcm",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "400",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.0",
         },
         {
            model: "windows server datacenter edition itanium sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "pix os",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.1",
         },
         {
            model: "networks contact center",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.6",
         },
         {
            model: "windows server standard edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks bcm",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "200",
         },
         {
            model: "rtx2000",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "windows server enterprise edition itanium sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "windows xp professional sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "agent desktop",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "1.1.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "conference connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1(1)",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.10",
         },
         {
            model: "gr3000",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "windows xp tablet pc edition",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.2",
         },
         {
            model: "call manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5x",
         },
         {
            model: "-release-p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p32",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "ciscoworks cd1 2nd edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ax7800s",
            scope: null,
            trust: 0.3,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2.2",
         },
         {
            model: "networks universal signaling point",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5200",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.6",
         },
         {
            model: "networks callpilot 702t",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ciscoworks wireless lan solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1105",
         },
         {
            model: "networks optical metro",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5200",
         },
         {
            model: "sn storage router sn5428-3.3.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2.1",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(3)",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1x",
         },
         {
            model: "conference connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.2",
         },
         {
            model: "ciscoworks cd1 4th edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "meetingplace",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(5)",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.46",
         },
         {
            model: "windows datacenter server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows datacenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.6.2",
         },
         {
            model: "windows xp professional sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "rt57i",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2x",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "css11501 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "gr4000",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "networks callpilot 201i",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "ciscoworks",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p38",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4(2)",
         },
         {
            model: "rt105",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.2",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "intuity audix r5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1648",
         },
         {
            model: "alaxala ax",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "ciscoworks windows/wug",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "windows datacenter server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "css11500 content services switch s",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "7.1.3",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.6",
         },
         {
            model: "personal assistant",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "ciscoworks cd1 1st edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1x",
         },
         {
            model: "ciscoworks hosting solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1105",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5",
         },
         {
            model: "windows professional sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.12",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3.5.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82501.2.11",
         },
         {
            model: "rtv700",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.5",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3.6.1",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(1)",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "support tools",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp professional",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "sn storage router sn5428-3.3.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.5",
         },
         {
            model: "sn storage router sn5428-3.2.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1.7.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "rt300i",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "secure acs solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3.2",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.4",
         },
         {
            model: "sn storage router sn5428-2-3.3.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82301.2.11",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(4)",
         },
         {
            model: "-current",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "bigip",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.13",
         },
         {
            model: "windows server datacenter edition itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "ios xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rtx1000",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "coat systems cacheos",
            scope: null,
            trust: 0.3,
            vendor: "blue",
            version: null,
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.3",
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2.3",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(7)",
         },
         {
            model: "networks ax5400s",
            scope: null,
            trust: 0.3,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "windows xp embedded sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "css11500 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ciscoworks windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "css11503 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(2)",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3(3)",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.11",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1612",
         },
         {
            model: "windows xp home sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "-release-p17",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "windows server standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "windows xp tablet pc edition sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "ciscoworks windows",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1",
         },
         {
            model: "rt250i",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "conference connection",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp media center edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "windows professional sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "emergency responder",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "css11800 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0",
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.3",
         },
         {
            model: "ciscoworks cd1 3rd edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1",
         },
         {
            model: "intelligent contact manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "-release-p42",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "windows server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "networks bcm",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1000",
         },
         {
            model: "networks wlan access point",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7250.0",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.9",
         },
         {
            model: "ap1200",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "BID",
            id: "13676",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Secunia",
      sources: [
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "39827",
         },
         {
            db: "PACKETSTORM",
            id: "38326",
         },
      ],
      trust: 0.4,
   },
   cve: "CAN-2005-0356",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [],
            cvssV3: [],
            severity: [
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#637934",
                  trust: 0.8,
                  value: "4.73",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Certain TCP implementations may allow a remote attacker to arbitrarily modify host timestamp values, leading to a denial-of-service condition. A denial-of-service vulnerability exists for the TCP RFC 1323. The issue resides in the Protection Against Wrapped Sequence Numbers (PAWS) technique that was included to increase overall TCP performance. \nWhen TCP 'timestamps' are enabled, both hosts at the endpoints of a TCP connection employ internal clocks to mark TCP headers with a 'timestamp' value. \nThe issue manifests if an attacker transmits a sufficient TCP PAWS packet to a vulnerable computer. The attacker sets a large value as the packet timestamp. When the target computer processes this packet, the internal timer is updated to the large value that the attacker supplied. This causes all other valid packets that are received subsequent to an attack to be dropped, because they are deemed to be too old or invalid. This type of attack will effectively deny service for a target connection. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=============================================================================\nFreeBSD-SA-05:15.tcp                                        Security Advisory\n                                                          The FreeBSD Project\n\nTopic:          TCP connection stall denial of service\n\nCategory:       core\nModule:         inet\nAnnounced:      2005-06-29\nCredits:        Noritoshi Demizu\nAffects:        All FreeBSD releases. \nCorrected:      2005-06-29 21:38:48 UTC (RELENG_5, 5.4-STABLE)\n                2005-06-29 21:41:03 UTC (RELENG_5_4, 5.4-RELEASE-p3)\n                2005-06-29 21:42:33 UTC (RELENG_5_3, 5.3-RELEASE-p17)\n                2005-06-29 21:43:42 UTC (RELENG_4, 4.11-STABLE)\n                2005-06-29 21:45:14 UTC (RELENG_4_11, 4.11-RELEASE-p11)\n                2005-06-29 21:46:15 UTC (RELENG_4_10, 4.10-RELEASE-p16)\nCVE Name:       CAN-2005-0356, CAN-2005-2068\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit\n<URL:http://www.freebsd.org/security/>. \n\nI.   Background\n\nThe Transmission Control Protocol (TCP) of the TCP/IP protocol suite\nprovides a connection-oriented, reliable, sequence-preserving data\nstream service.  TCP\npackets with the SYN flag set are used during setup of new TCP\nconnections. \n\nII.  Problem Description\n\nTwo problems have been discovered in the FreeBSD TCP stack. \n\nFirst, when a TCP packets containing a timestamp is received, inadequate\nchecking of sequence numbers is performed, allowing an attacker to\nartificially increase the internal \"recent\" timestamp for a connection. \n\nSecond, a TCP packet with the SYN flag set is accepted for established\nconnections, allowing an attacker to overwrite certain TCP options. \n\nIII. Impact\n\nUsing either of the two problems an attacker with knowledge of the\nlocal and remote IP and port numbers associated with a connection\ncan cause a denial of service situation by stalling the TCP connection. \nThe stalled TCP connection my be closed after some time by the other\nhost. \n\nIV.  Workaround\n\nIn some cases it may be possible to defend against these attacks by\nblocking the attack packets using a firewall.  Packets used to effect\neither of these attacks would have spoofed source IP addresses. \n\nV.   Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to 4-STABLE or 5-STABLE, or to the\nRELENG_5_4, RELENG_5_3, RELENG_4_11, or RELENG_4_10 security branch\ndated after the correction date. \n\n2) To patch your present system:\n\nThe following patches have been verified to apply to FreeBSD 4.10,\n4.11, 5.3, and 5.4 systems. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 4.x]\n# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch\n# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp4.patch.asc\n\n[FreeBSD 5.x]\n# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp.patch\n# fetch ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-05:15/tcp.patch.asc\n\nb) Apply the patch. \n\n# cd /usr/src\n# patch < /path/to/patch\n\nc) Recompile your kernel as described in\n<URL:http://www.freebsd.org/handbook/kernelconfig.html> and reboot the\nsystem. \n\nVI.  Correction details\n\nThe following list contains the revision numbers of each file that was\ncorrected in FreeBSD. \n\nBranch                                                           Revision\n  Path\n- -------------------------------------------------------------------------\nRELENG_4\n  src/sys/netinet/tcp_input.c                                  1.107.2.44\nRELENG_4_11\n  src/UPDATING                                             1.73.2.91.2.12\n  src/sys/conf/newvers.sh                                  1.44.2.39.2.15\n  src/sys/netinet/tcp_input.c                              1.107.2.41.4.3\nRELENG_4_10\n  src/UPDATING                                             1.73.2.90.2.17\n  src/sys/conf/newvers.sh                                  1.44.2.34.2.18\n  src/sys/netinet/tcp_input.c                              1.107.2.41.2.1\nRELENG_5\n  src/sys/netinet/tcp_input.c                                  1.252.2.16\nRELENG_5_4\n  src/UPDATING                                            1.342.2.24.2.12\n  src/sys/conf/newvers.sh                                   1.62.2.18.2.8\n  src/sys/netinet/tcp_input.c                              1.252.2.14.2.1\nRELENG_5_3\n  src/UPDATING                                            1.342.2.13.2.20\n  src/sys/conf/newvers.sh                                  1.62.2.15.2.22\n  src/sys/netinet/tcp_input.c                                   1.252.4.1\n- -------------------------------------------------------------------------\n\nVII. References\n\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0356\nhttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2068\nhttp://www.kb.cert.org/vuls/id/637934\n\nThe latest revision of this advisory is available at\nftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.1 (FreeBSD)\n\niD8DBQFCwxe7FdaIBMps37IRAi39AJ9ss6PVEwloS4SlKEWi5S1hpHnzmACeJF7H\nrKmK2NtleJ98dTLWW4QLMn4=\n=6fBH\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products TCP Timestamp Denial of Service\n\nSECUNIA ADVISORY ID:\nSA15393\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15393/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n>From remote\n\nOPERATING SYSTEM:\nCisco SN5400 Series Storage Routers\nhttp://secunia.com/product/2188/\nCisco MGX 8900 Series Multiservice Switches\nhttp://secunia.com/product/5117/\nCisco MGX 8800 Series Multiservice Switches\nhttp://secunia.com/product/5116/\nCisco MGX 8200 Series Edge Concentrators\nhttp://secunia.com/product/5115/\nCisco Content Services Switch 11000 Series (WebNS)\nhttp://secunia.com/product/1507/\nCisco Aironet 350 Series Access Point\nhttp://secunia.com/product/5114/\nCisco Aironet 1200 Series Access Point\nhttp://secunia.com/product/1929/\n\nDESCRIPTION:\nA vulnerability has been reported in some Cisco products, which can\nbe exploited by malicious people to cause a DoS (Denial of Service)\non active TCP sessions. \n\nThe vulnerability is caused due to an error in the implementation of\nthe TCP Timestamp option and can be exploited via specially crafted\npackets to cause a targeted TCP session to stall until it's reset. \n\nSuccessful exploitation requires knowledge of IP address information\nof the source and destination of the TCP network connection. \n\nThe vulnerability affects the following products:\n* SN5400 series storage routers\n* CSS11000 series content services switches\n* AP350 and AP1200 series Access Points running VxWorks\n* MGX8200, MGX8800, and MGX8900 series WAN switches (only management\ninterfaces)\n\nSOLUTION:\nSN5400 series storage routers:\nThe vulnerability has been addressed by CSCin85370. \n\nCSS11000 series content services switches:\nThe vulnerability has been addressed by CSCeh40395. \n\nAP350 and AP1200 series Access Points:\nThe vendor recommends upgrading APs running VxWorks to Cisco IOS. \n\nMGX series WAN switches:\nThe vulnerability has been documented by CSCeh85125 and CSCeh85130. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Noritoshi Demizu. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml\n\nOTHER REFERENCES:\nUS-CERT VU#637934:\nhttp://www.kb.cert.org/vuls/id/637934\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nFor more information:\nSA14904\n\nSOLUTION:\nApply updated packages. \n\nFor more information:\nSA15393\n\nThe vulnerability affects all versions of CacheOS and SGOS. \n\nSOLUTION:\nThe vendor recommends disabling RFC1323 support until a patch is\navailable",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "PACKETSTORM",
            id: "38381",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "39827",
         },
         {
            db: "PACKETSTORM",
            id: "38326",
         },
      ],
      trust: 1.44,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#637934",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "13676",
            trust: 1.1,
         },
         {
            db: "NVD",
            id: "CAN-2005-0356",
            trust: 0.5,
         },
         {
            db: "SECUNIA",
            id: "15417",
            trust: 0.2,
         },
         {
            db: "SECUNIA",
            id: "15393",
            trust: 0.2,
         },
         {
            db: "SECUNIA",
            id: "15851",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "38381",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "37673",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "37672",
            trust: 0.1,
         },
         {
            db: "SECUNIA",
            id: "16701",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "39827",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "38326",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "PACKETSTORM",
            id: "38381",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "39827",
         },
         {
            db: "PACKETSTORM",
            id: "38326",
         },
      ],
   },
   id: "VAR-200505-1328",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 1,
   },
   last_update_date: "2022-05-06T15:25:21.418000Z",
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.1,
            url: "http://www.ietf.org/rfc/rfc1323.txt",
         },
         {
            trust: 1.1,
            url: "http://www.ietf.org/rfc/rfc793.txt",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/13676",
         },
         {
            trust: 0.5,
            url: "http://www.kb.cert.org/vuls/id/637934",
         },
         {
            trust: 0.4,
            url: "http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml",
         },
         {
            trust: 0.4,
            url: "http://openbsd.org/errata36.html#tcp",
         },
         {
            trust: 0.4,
            url: "http://www.bluecoat.com/support/knowledge/advisory_tcp_can-2005-0356.html",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/secunia_vacancies/",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/elmodocs2/security/asa-2005-148.pdf",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/elmodocs2/security/asa-2006-032.htm",
         },
         {
            trust: 0.3,
            url: "http://www.alaxala.com/jp/support/icmp-20050518.html",
         },
         {
            trust: 0.3,
            url: "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/tcp_input.c",
         },
         {
            trust: 0.3,
            url: "http://www.microsoft.com/technet/security/advisory/899480.mspx",
         },
         {
            trust: 0.3,
            url: "http://www.rtpro.yamaha.co.jp/rt/faq/tcpip/vu637934.html",
         },
         {
            trust: 0.3,
            url: "http://tech.f5.com/home/bigip-next/solutions/advisories/sol4743.html",
         },
         {
            trust: 0.3,
            url: "http://secunia.com/advisories/15393/",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-2068",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=can-2005-0356",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/security/>.",
         },
         {
            trust: 0.1,
            url: "http://www.freebsd.org/handbook/kernelconfig.html>",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/15417/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/100/",
         },
         {
            trust: 0.1,
            url: "http://www.kb.cert.org/vuls/id/jgei-6abpp2",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/1507/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5117/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5115/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5114/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5116/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2188/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/1929/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/14904/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/16701/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/136/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2213/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2133/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/15851/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2132/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2214/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "PACKETSTORM",
            id: "38381",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "39827",
         },
         {
            db: "PACKETSTORM",
            id: "38326",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "PACKETSTORM",
            id: "38381",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "39827",
         },
         {
            db: "PACKETSTORM",
            id: "38326",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-05-18T00:00:00",
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            date: "2005-05-18T00:00:00",
            db: "BID",
            id: "13676",
         },
         {
            date: "2005-07-01T06:40:37",
            db: "PACKETSTORM",
            id: "38381",
         },
         {
            date: "2005-05-29T20:22:44",
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            date: "2005-05-29T20:22:44",
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            date: "2005-09-07T04:42:13",
            db: "PACKETSTORM",
            id: "39827",
         },
         {
            date: "2005-07-01T04:46:03",
            db: "PACKETSTORM",
            id: "38326",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-08-23T00:00:00",
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            date: "2006-05-17T23:29:00",
            db: "BID",
            id: "13676",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "13676",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "TCP does not adequately validate segments before updating timestamp value",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "13676",
         },
      ],
      trust: 0.3,
   },
}

var-200709-0062
Vulnerability from variot

Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. Attackers may leverage this issue to access a device from an unauthorized remote location; this may aid in further attacks.


Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications.

Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/


TITLE: Cisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback Address Weakness

SECUNIA ADVISORY ID: SA26988

VERIFY ADVISORY: http://secunia.com/advisories/26988/

CRITICAL: Not critical

IMPACT: Security Bypass

WHERE:

From local network

OPERATING SYSTEM: Cisco 7600 Series 12.x http://secunia.com/product/15865/ Cisco Catalyst 6500 Series 12.x http://secunia.com/product/15864/

DESCRIPTION: A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions.

The problem is that packets destined for the 127.0.0.0/8 network may be received and processed by e.g. the Supervisor module or Multilayer Switch Feature Card (MSFC). This can be exploited to e.g. bypass existing access control lists.

Successful exploitation requires that systems are running Hybrid Mode (Catalyst OS (CatOS) software on the Supervisor Engine and IOS Software on the MSFC) or Native Mode (IOS Software on both the Supervisor Engine and the MSFC).

The weakness is reported in all software versions on Cisco Catalyst 6500 and Cisco 7600 series prior to 12.2(33)SXH.

SOLUTION: Update to 12.2(33)SXH.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Lee E. Rian.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200709-0062",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(1\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 6500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.5\\(1\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 7600",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "7600 series",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 6500 series",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 6500",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 7600",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 7600",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "sup2_msfc2",
         },
         {
            model: "catalyst 7600",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "sup720_msfc3",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.1",
         },
         {
            model: "catalyst sup720/msfc3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "catalyst sup2/msfc2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65005.4.1",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "25822",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup2_msfc2:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600:*:*:sup720_msfc3:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Lee E. Rian",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2007-5134",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2007-5134",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-28496",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2007-5134",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200709-409",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-28496",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended. \nAttackers may leverage this issue to access a device from an unauthorized remote location; this may aid in further attacks. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,700 different Windows applications. \n\nRequest your account, the Secunia Network Software Inspector (NSI):\nhttp://secunia.com/network_software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Catalyst 6500 / Cisco 7600 Series Devices Accessible Loopback\nAddress Weakness\n\nSECUNIA ADVISORY ID:\nSA26988\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26988/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n>From local network\n\nOPERATING SYSTEM:\nCisco 7600 Series 12.x\nhttp://secunia.com/product/15865/\nCisco Catalyst 6500 Series 12.x\nhttp://secunia.com/product/15864/\n\nDESCRIPTION:\nA weakness has been reported in Cisco Catalyst 6500 and Cisco 7600\nseries devices, which can be exploited by malicious people to bypass\ncertain security restrictions. \n\nThe problem is that packets destined for the 127.0.0.0/8 network may\nbe received and processed by e.g. the Supervisor module or Multilayer\nSwitch Feature Card (MSFC). This can be exploited to e.g. bypass\nexisting access control lists. \n\nSuccessful exploitation requires that systems are running Hybrid Mode\n(Catalyst OS (CatOS) software on the Supervisor Engine and IOS\nSoftware on the MSFC) or Native Mode (IOS Software on both the\nSupervisor Engine and the MSFC). \n\nThe weakness is reported in all software versions on Cisco Catalyst\n6500 and Cisco 7600 series prior to 12.2(33)SXH. \n\nSOLUTION:\nUpdate to 12.2(33)SXH. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Lee E. Rian. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "BID",
            id: "25822",
         },
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            db: "PACKETSTORM",
            id: "59638",
         },
      ],
      trust: 2.07,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "25822",
            trust: 2.8,
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
            trust: 2.8,
         },
         {
            db: "SECUNIA",
            id: "26988",
            trust: 2.6,
         },
         {
            db: "SECTRACK",
            id: "1018742",
            trust: 2.5,
         },
         {
            db: "SECTRACK",
            id: "1018743",
            trust: 1.7,
         },
         {
            db: "VUPEN",
            id: "ADV-2007-3276",
            trust: 1.7,
         },
         {
            db: "XF",
            id: "36826",
            trust: 1.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
            trust: 0.8,
         },
         {
            db: "FULLDISC",
            id: "20070927 RE: CAT6500 ACCESSIBLE VIA 127.0.0.X LOOPBACK ADDRESSES",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20070926 CATALYST 6500 AND CISCO 7600 SERIES DEVICES ACCESSIBLE VIA LOOPBACK ADDRESS",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-28496",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "59638",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            db: "BID",
            id: "25822",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "PACKETSTORM",
            id: "59638",
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   id: "VAR-200709-0062",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T13:10:22.350000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sr-20070926-lb",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-264",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/25822",
         },
         {
            trust: 2.5,
            url: "http://securitytracker.com/id?1018742",
         },
         {
            trust: 2.1,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
         },
         {
            trust: 1.7,
            url: "http://seclists.org/fulldisclosure/2007/sep/0573.html",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id?1018743",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/26988",
         },
         {
            trust: 1.4,
            url: "http://www.frsirt.com/english/advisories/2007/3276",
         },
         {
            trust: 1.4,
            url: "http://xforce.iss.net/xforce/xfdb/36826",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2007/3276",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826",
         },
         {
            trust: 0.9,
            url: "http://secunia.com/advisories/26988/",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5134",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5134",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/en/us/products/hw/switches/index.html",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/15865/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/network_software_inspector/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/15864/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/about_secunia_advisories/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            db: "BID",
            id: "25822",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "PACKETSTORM",
            id: "59638",
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            db: "BID",
            id: "25822",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            db: "PACKETSTORM",
            id: "59638",
         },
         {
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2007-09-27T00:00:00",
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            date: "2007-09-26T00:00:00",
            db: "BID",
            id: "25822",
         },
         {
            date: "2007-10-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            date: "2007-09-27T23:54:21",
            db: "PACKETSTORM",
            id: "59638",
         },
         {
            date: "2007-09-27T19:17:00",
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            date: "2007-09-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-07-29T00:00:00",
            db: "VULHUB",
            id: "VHN-28496",
         },
         {
            date: "2015-05-07T17:35:00",
            db: "BID",
            id: "25822",
         },
         {
            date: "2007-10-09T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
         {
            date: "2017-07-29T01:33:25.053000",
            db: "NVD",
            id: "CVE-2007-5134",
         },
         {
            date: "2007-10-01T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst 6500 and  Cisco 7600 Loopback in the series  IP Address restriction bypass vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2007-000717",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "permissions and access control",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200709-409",
         },
      ],
      trust: 0.6,
   },
}

var-200505-0572
Vulnerability from variot

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. Certain TCP implementations may allow a remote attacker to arbitrarily modify host timestamp values, leading to a denial-of-service condition. TCP The implementation of the time stamp option is TCP A vulnerability exists that allows the internal timer on a connection to be changed to any value.the system TCP Connection reset and service disruption (DoS) It may be in a state. The Transmission Control Protocol (TCP) defined in RFC 793 allows reliable host-to-host transmission in a message exchange network. RFC 1323 introduces a number of technologies that enhance TCP performance, two of which are TCP timestamps and sequence number rollback protection (PAWS).

There are security holes in the PAWS technology of TCP RFC 1323. If TCP timestamps are enabled, both endpoints of the TCP connection use the internal clock to mark the TCP header with the timestamp value.

This vulnerability can occur if an attacker sends enough TCP PAWS packets to the vulnerable computer. An attacker can set the message timestamp to a large value. When the target machine processes this message, the internal timer will be updated to this value, which may cause all valid messages received afterwards to be discarded because these messages are considered too old or invalid. This technique may cause the target connection to deny service.


Bist Du interessiert an einem neuen Job in IT-Sicherheit?

Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/


TITLE: Cisco Various Products TCP Timestamp Denial of Service

SECUNIA ADVISORY ID: SA15393

VERIFY ADVISORY: http://secunia.com/advisories/15393/

CRITICAL: Less critical

IMPACT: DoS

WHERE:

From remote

OPERATING SYSTEM: Cisco SN5400 Series Storage Routers http://secunia.com/product/2188/ Cisco MGX 8900 Series Multiservice Switches http://secunia.com/product/5117/ Cisco MGX 8800 Series Multiservice Switches http://secunia.com/product/5116/ Cisco MGX 8200 Series Edge Concentrators http://secunia.com/product/5115/ Cisco Content Services Switch 11000 Series (WebNS) http://secunia.com/product/1507/ Cisco Aironet 350 Series Access Point http://secunia.com/product/5114/ Cisco Aironet 1200 Series Access Point http://secunia.com/product/1929/

DESCRIPTION: A vulnerability has been reported in some Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service) on active TCP sessions.

Successful exploitation requires knowledge of IP address information of the source and destination of the TCP network connection.

The vulnerability affects the following products: * SN5400 series storage routers * CSS11000 series content services switches * AP350 and AP1200 series Access Points running VxWorks * MGX8200, MGX8800, and MGX8900 series WAN switches (only management interfaces)

SOLUTION: SN5400 series storage routers: The vulnerability has been addressed by CSCin85370.

CSS11000 series content services switches: The vulnerability has been addressed by CSCeh40395.

AP350 and AP1200 series Access Points: The vendor recommends upgrading APs running VxWorks to Cisco IOS.

MGX series WAN switches: The vulnerability has been documented by CSCeh85125 and CSCeh85130.

PROVIDED AND/OR DISCOVERED BY: US-CERT credits Noritoshi Demizu.

ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml

OTHER REFERENCES: US-CERT VU#637934: http://www.kb.cert.org/vuls/id/637934


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. Cisco has acknowledged that various Cisco products are affected.

The published Internet-Draft details three types of attacks, which utilize the following ICMP messages to cause a negative impact on TCP connections either terminating or originating from a vulnerable device.

1) ICMP "hard" error messages 2) ICMP "fragmentation needed and Don't Fragment (DF) bit set" messages (known as PMTUD attacks) 3) ICMP "source quench" messages

These attacks can all be exploited to cause TCP connection resets, reduce the throughput in existing TCP connections, or consume large amounts of CPU and memory resources.

NOTE: See the original advisory for a list of affected versions.

SOLUTION: See patch matrix in vendor advisory for information about fixes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200505-0572",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.9,
            vendor: "freebsd",
            version: "4.6.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.9,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.9,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.9,
            vendor: "freebsd",
            version: "1.1.5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.9,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2.8",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "ciscoworks common services",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "emergency responder",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.1",
         },
         {
            model: "ciscoworks access control list manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.6",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.3.1",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.6",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.2",
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.0.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.2",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.1.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.1.6.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.3",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.1",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "ciscoworks lms",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.3",
         },
         {
            model: "ciscoworks access control list manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2.6",
         },
         {
            model: "conference connection",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.46",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2.4",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.3.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.1.6",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2.5",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.1.7.1",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "openbsd",
            version: "3.3",
         },
         {
            model: "ciscoworks common management foundation",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "2.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "4.1",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.3,
            vendor: "freebsd",
            version: "3.1",
         },
         {
            model: "intelligent contact manager",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "5.0",
         },
         {
            model: "unity server",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "2.1.0",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.3.6.1",
         },
         {
            model: "callpilot",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "702t",
         },
         {
            model: "ciscoworks 1105 wireless lan solution engine",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ciscoworks cd1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3rd",
         },
         {
            model: "content services switch 11150",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.3.5.1",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.6.2",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1\\(3\\)",
         },
         {
            model: "business communications manager",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "1000",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.3\\(3\\)",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "rt250i",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "ip contact center express",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2.2-k9",
         },
         {
            model: "ciscoworks windows",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.20_\\(03.10\\)s",
         },
         {
            model: "aironet ap1200",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "9.0.2",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2-3.3.1-k9",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "9.0.3",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1.3",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2.1-k9",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(3a\\)",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.5.12",
         },
         {
            model: "interactive voice response",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.6",
         },
         {
            model: "gs4000",
            scope: "eq",
            trust: 1,
            vendor: "hitachi",
            version: "*",
         },
         {
            model: "e-mail manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "rtx1500",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "mgx 8230",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.2.10",
         },
         {
            model: "optical metro 5100",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "business communications manager",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "400",
         },
         {
            model: "windows 2003 server",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "enterprise_64-bit",
         },
         {
            model: "optical metro 5000",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1\\(5\\)",
         },
         {
            model: "mgx 8250",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.2.10",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.4\\(2\\)",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.4\\(1\\)",
         },
         {
            model: "content services switch 11000",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "networks",
            scope: "eq",
            trust: 1,
            vendor: "alaxala",
            version: "ax7800s",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.6.2",
         },
         {
            model: "content services switch 11501",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.6.4",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0.3",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.3\\(3\\)",
         },
         {
            model: "windows 2003 server",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "standard",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.5.9",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.42",
         },
         {
            model: "web collaboration option",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0.1",
         },
         {
            model: "content services switch 11800",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "content services switch 11500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "universal signaling point",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "5200",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "9.0",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.3\\(1\\)",
         },
         {
            model: "content services switch 11503",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.10_\\(05.07\\)s",
         },
         {
            model: "rtx1100",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.30_\\(00.08\\)s",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "ip contact center enterprise",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "windows 2003 server",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "standard_64-bit",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.5.10",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "universal signaling point",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "compact_lite",
         },
         {
            model: "ciscoworks windows wug",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "ciscoworks cd1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2nd",
         },
         {
            model: "ethernet routing switch 1648",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "callpilot",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "200i",
         },
         {
            model: "rt300i",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "business communications manager",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "200",
         },
         {
            model: "aironet ap350",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "windows xp",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "*",
         },
         {
            model: "ciscoworks cd1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4th",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2-3.3.2-k9",
         },
         {
            model: "gr3000",
            scope: "eq",
            trust: 1,
            vendor: "hitachi",
            version: "*",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(1\\)",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.3.2-k9",
         },
         {
            model: "windows 2003 server",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "enterprise",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1\\(7\\)",
         },
         {
            model: "networks",
            scope: "eq",
            trust: 1,
            vendor: "alaxala",
            version: "ax5400s",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.6.3",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1.1",
         },
         {
            model: "ethernet routing switch 1612",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "succession communication server 1000",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "ciscoworks cd1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5th",
         },
         {
            model: "windows 2003 server",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "r2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(1.20\\)",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "9.0.1",
         },
         {
            model: "content services switch 11050",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.5.11",
         },
         {
            model: "mgx 8230",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.2.11",
         },
         {
            model: "rtv700",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "mgx 8250",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.2.11",
         },
         {
            model: "windows 2003 server",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "web",
         },
         {
            model: "alaxala",
            scope: "eq",
            trust: 1,
            vendor: "hitachi",
            version: "ax",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(2\\)",
         },
         {
            model: "7250 wlan access point",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5.1-k9",
         },
         {
            model: "rt105",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(2\\)",
         },
         {
            model: "callpilot",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "201i",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.5.6",
         },
         {
            model: "ciscoworks cd1",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1st",
         },
         {
            model: "rtx2000",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "rtx1000",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.3\\(4\\)",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.3\\(1\\)",
         },
         {
            model: "contact center",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "ciscoworks vpn security management solution",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.30_\\(00.09\\)s",
         },
         {
            model: "content services switch 11506",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "survivable remote gateway",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "1.0",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.6",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.3\\(2\\)",
         },
         {
            model: "sn 5428 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.3.1-k9",
         },
         {
            model: "agent desktop",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.20_\\(03.09\\)s",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.2\\(3\\)",
         },
         {
            model: "ciscoworks 1105 hosting solution engine",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1\\(4\\)",
         },
         {
            model: "ethernet routing switch 1624",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.4",
         },
         {
            model: "remote monitoring suite option",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "optical metro 5200",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "networks",
            scope: "eq",
            trust: 1,
            vendor: "alaxala",
            version: "ax7800r",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "9.0.4",
         },
         {
            model: "windows 2000",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "*",
         },
         {
            model: "gr4000",
            scope: "eq",
            trust: 1,
            vendor: "hitachi",
            version: "*",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "meetingplace",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "9.0.5",
         },
         {
            model: "tmos",
            scope: "eq",
            trust: 1,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "7220 wlan access point",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "*",
         },
         {
            model: "rt57i",
            scope: "eq",
            trust: 1,
            vendor: "yamaha",
            version: "*",
         },
         {
            model: "conference connection",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1\\(1\\)",
         },
         {
            model: "sn 5420 storage router",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "1.1\\(2\\)",
         },
         {
            model: "callpilot",
            scope: "eq",
            trust: 1,
            vendor: "nortel",
            version: "703t",
         },
         {
            model: "support tools",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "avaya",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "blue coat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openbsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "redback",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "windows 2000",
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows server 2003",
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows xp",
            scope: "eq",
            trust: 0.8,
            vendor: "microsoft",
            version: "sp3",
         },
         {
            model: null,
            scope: null,
            trust: 0.6,
            vendor: "none",
            version: null,
         },
         {
            model: "css11500 content services switch s",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.30",
         },
         {
            model: "css11500 content services switch s",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.20",
         },
         {
            model: "windows xp home sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.3",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "intuity audix",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "secure acs solution engine",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "windows server enterprise edition itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "remote monitoring suite option",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure access control server",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "sn storage router sn5428-2-3.3.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "windows server enterprise edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows xp 64-bit edition",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "bigip",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "9.1",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "4.10-prerelease",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.3",
         },
         {
            model: "ip contact center express",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.6.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "sn storage router sn5428-3.2.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "networks callpilot 200i",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "windows server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows advanced server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "rtx1100",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "rfc tcp extensions for high performance",
            scope: "eq",
            trust: 0.3,
            vendor: "ietf",
            version: "1323:",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(4)",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3(1)",
         },
         {
            model: "windows server datacenter edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "secure acs solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3.1",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "7.1.4",
         },
         {
            model: "-release/alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "ciscoworks vpn/security management solution",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows advanced server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "windows server datacenter edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks callpilot 703t",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "interactive response",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "windows datacenter server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1",
         },
         {
            model: "windows professional",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "css11000 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6",
         },
         {
            model: "-stablepre2001-07-20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5.1",
         },
         {
            model: "windows xp media center edition sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "intelligent contact manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "web collaboration option",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks wlan access point",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7220.0",
         },
         {
            model: "networks optical metro",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "gs4000",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "windows xp 64-bit edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows xp 64-bit edition version sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.3",
         },
         {
            model: "-release-p3",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.6",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(2)",
         },
         {
            model: "windows server enterprise edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "sn5400 series storage routers",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "open server",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "6.0",
         },
         {
            model: "windows xp 64-bit edition version",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0.3",
         },
         {
            model: "unity server",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1624",
         },
         {
            model: "windows server standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003x64",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.2x",
         },
         {
            model: "networks optical metro",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5100",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1)",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2.1",
         },
         {
            model: "windows advanced server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(3)",
         },
         {
            model: "interactive voice response",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11150 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp tablet pc edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "sn storage router sn5428-2.5.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0.x",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82301.2.10",
         },
         {
            model: "css11050 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "e-mail manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server web edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82501.2.10",
         },
         {
            model: "windows xp media center edition",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.4",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.11",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1.20)",
         },
         {
            model: "mgx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11506 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows datacenter server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.3x",
         },
         {
            model: "ciscoworks cd1 5th edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0.1",
         },
         {
            model: "coat systems sgos",
            scope: null,
            trust: 0.3,
            vendor: "blue",
            version: null,
         },
         {
            model: "-stablepre2002-03-07",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1.1",
         },
         {
            model: "windows advanced server sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows xp embedded",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(2)",
         },
         {
            model: "networks universal signaling point compact/lite",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.x",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.x",
         },
         {
            model: "windows professional sp3",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "networks srg",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1.0",
         },
         {
            model: "alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4(1)",
         },
         {
            model: "secure acs solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3",
         },
         {
            model: "ip contact center enterprise",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.42",
         },
         {
            model: "cvlan",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "networks ax7800r",
            scope: null,
            trust: 0.3,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
         {
            model: "windows xp home",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "windows server web edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows professional sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows advanced server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "ap350",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "rtx1500",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "secure acs for windows server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "networks communications server",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1000",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.4x",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.2",
         },
         {
            model: "secure access control server",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(3)",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "networks bcm",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "400",
         },
         {
            model: "windows server datacenter edition itanium sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "pix os",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.1",
         },
         {
            model: "networks contact center",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.6",
         },
         {
            model: "windows server standard edition sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "networks bcm",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "200",
         },
         {
            model: "rtx2000",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "windows server enterprise edition itanium sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "windows xp professional sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "agent desktop",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "conference connection",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.1(1)",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.10",
         },
         {
            model: "gr3000",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "windows xp tablet pc edition",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.2",
         },
         {
            model: "call manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5x",
         },
         {
            model: "-release-p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p32",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "ciscoworks cd1 2nd edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "networks ax7800s",
            scope: null,
            trust: 0.3,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "networks universal signaling point",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5200",
         },
         {
            model: "networks callpilot 702t",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ciscoworks wireless lan solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1105",
         },
         {
            model: "networks optical metro",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5200",
         },
         {
            model: "sn storage router sn5428-3.3.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.2.1",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(3)",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.1x",
         },
         {
            model: "ciscoworks cd1 4th edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "meetingplace",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.6.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(5)",
         },
         {
            model: "windows datacenter server sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "windows datacenter server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.6.2",
         },
         {
            model: "windows xp professional sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "rt57i",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.2x",
         },
         {
            model: "css11501 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "gr4000",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "networks callpilot 201i",
            scope: null,
            trust: 0.3,
            vendor: "nortel",
            version: null,
         },
         {
            model: "ciscoworks",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p38",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.4(2)",
         },
         {
            model: "rt105",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "intuity audix r5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1648",
         },
         {
            model: "alaxala ax",
            scope: null,
            trust: 0.3,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.0",
         },
         {
            model: "ciscoworks windows/wug",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "windows datacenter server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "css11500 content services switch s",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "7.1.3",
         },
         {
            model: "personal assistant",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.2",
         },
         {
            model: "ciscoworks cd1 1st edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "2.1x",
         },
         {
            model: "ciscoworks hosting solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1105",
         },
         {
            model: "secure acs for windows nt",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.5",
         },
         {
            model: "windows professional sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.12",
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3.5.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82501.2.11",
         },
         {
            model: "rtv700",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "secure acs for unix",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3.6.1",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(1)",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.2",
         },
         {
            model: "support tools",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp professional",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "sn storage router sn5428-3.3.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0.5",
         },
         {
            model: "sn storage router sn5428-3.2.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "rt300i",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "secure acs solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3.2",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.4",
         },
         {
            model: "sn storage router sn5428-2-3.3.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "mgx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "82301.2.11",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(4)",
         },
         {
            model: "-current",
            scope: null,
            trust: 0.3,
            vendor: "freebsd",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-stablepre050201",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "bigip",
            scope: "ne",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.13",
         },
         {
            model: "windows server datacenter edition itanium",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "20030",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.4",
         },
         {
            model: "ios xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rtx1000",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "coat systems cacheos",
            scope: null,
            trust: 0.3,
            vendor: "blue",
            version: null,
         },
         {
            model: "sn storage router",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "54201.1(7)",
         },
         {
            model: "networks ax5400s",
            scope: null,
            trust: 0.3,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "windows xp embedded sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "css11500 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ciscoworks windows",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "css11503 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-release-p8",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "personal assistant",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.3(2)",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3(3)",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.11",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.2",
         },
         {
            model: "networks ethernet routing switch",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1612",
         },
         {
            model: "windows xp home sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "-release-p17",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "windows server standard edition",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2003",
         },
         {
            model: "windows xp tablet pc edition sp2",
            scope: "ne",
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "ciscoworks windows",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "rt250i",
            scope: null,
            trust: 0.3,
            vendor: "yamaha",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.10",
         },
         {
            model: "-stablepre122300",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.5",
         },
         {
            model: "conference connection",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows xp media center edition sp1",
            scope: null,
            trust: 0.3,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.3",
         },
         {
            model: "windows professional sp4",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "emergency responder",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "css11800 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-stable",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.1.1",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "9.0",
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.3",
         },
         {
            model: "ciscoworks cd1 3rd edition",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "-release",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "-release-p42",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "windows server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
         {
            model: "networks bcm",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "1000",
         },
         {
            model: "networks wlan access point",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "7250.0",
         },
         {
            model: "bigip",
            scope: "eq",
            trust: 0.3,
            vendor: "f5",
            version: "4.5.9",
         },
         {
            model: "ap1200",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "windows server",
            scope: "eq",
            trust: 0.3,
            vendor: "microsoft",
            version: "2000",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "CNVD",
            id: "CNVD-2005-1944",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:interactive_voice_response:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ip_contact_center_enterprise:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:personal_assistant:1.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:emergency_responder:1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:intelligent_contact_manager:5.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:personal_assistant:1.3\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:personal_assistant:1.3\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:personal_assistant:1.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.3:*:unix:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.3:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.6:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(1.20\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:agent_desktop:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:e-mail_manager:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:personal_assistant:1.3\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:personal_assistant:1.3\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.3.5.1:*:unix:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.3.6.1:*:unix:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.6.3:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.6.4:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.1.1:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:ip_contact_center_express:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:meetingplace:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.0:*:unix:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.1:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.5:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.6.2:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.0:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.3\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:web_collaboration_option:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:hitachi:alaxala:ax:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.3\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:2.46:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:mgx_8250:1.2.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:mgx_8250:1.2.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:remote_monitoring_suite_option:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.4:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:2.42:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.0.1:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.0.3:*:windows_nt:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.2:*:windows_server:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:support_tools:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:3.1\\(3a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:mgx_8230:1.2.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:mgx_8230:1.2.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:cisco:secure_access_control_server:3.3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:1.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:call_manager:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:2.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:3.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:unity_server:3.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_common_services:2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_lms:1.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:callpilot:201i:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:callpilot:702t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11501:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11503:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:optical_metro_5000:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:optical_metro_5100:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_1105_wireless_lan_solution_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_cd1:1st:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:conference_connection:1.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.10_\\(05.07\\)s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_access_control_list_manager:1.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_access_control_list_manager:1.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:business_communications_manager:1000:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:business_communications_manager:200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11000:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11050:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:7220_wlan_access_point:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:7250_wlan_access_point:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:ethernet_routing_switch_1612:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:survivable_remote_gateway:1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:universal_signaling_point:5200:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_cd1:4th:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_cd1:5th:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.30_\\(00.09\\)s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:standard_64-bit:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_common_management_foundation:2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:business_communications_manager:400:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:callpilot:200i:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11150:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:ethernet_routing_switch_1624:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:ethernet_routing_switch_1648:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:universal_signaling_point:compact_lite:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_1105_hosting_solution_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_windows_wug:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:conference_connection:1.1\\(1\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_vpn_security_management_solution:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:ciscoworks_windows:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:callpilot:703t:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:nortel:contact_center:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11506:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:content_services_switch_11800:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:optical_metro_5200:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:nortel:succession_communication_server_1000:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_cd1:2nd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ciscoworks_cd1:3rd:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.20_\\(03.09\\)s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.20_\\(03.10\\)s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:webns:7.30_\\(00.08\\)s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:alaxala:alaxala_networks:ax5400s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:alaxala:alaxala_networks:ax7800r:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:alaxala:alaxala_networks:ax7800s:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.5.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:9.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:sn_5420_storage_router:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:hitachi:gr3000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:hitachi:gr4000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rtx1000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rtx1100:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5420_storage_router_firmware:1.1\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5420_storage_router_firmware:1.1.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.5.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.5.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:9.0.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:9.0.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rt250i:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rt300i:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5420_storage_router_firmware:1.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5420_storage_router_firmware:1.1\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:2.5.1-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:3.2.1-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rt57i:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rtv700:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5420_storage_router_firmware:1.1\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5420_storage_router_firmware:1.1\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:3.2.2-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:3.3.1-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:3.3.2-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.5.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:4.5.12:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:9.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:f5:tmos:9.0.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:hitachi:gs4000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rt105:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rtx1500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:yamaha:rtx2000:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:2-3.3.1-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:sn_5428_storage_router:2-3.3.2-k9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Noritoshi Demizu Daniel Hartmeier※ daniel@benzedrine.cx",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2005-0356",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2005-0356",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-11565",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2005-0356",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#637934",
                  trust: 0.8,
                  value: "4.73",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200505-1247",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-11565",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. Certain TCP implementations may allow a remote attacker to arbitrarily modify host timestamp values, leading to a denial-of-service condition. TCP The implementation of the time stamp option is TCP A vulnerability exists that allows the internal timer on a connection to be changed to any value.the system TCP Connection reset and service disruption (DoS) It may be in a state. The Transmission Control Protocol (TCP) defined in RFC 793 allows reliable host-to-host transmission in a message exchange network. RFC 1323 introduces a number of technologies that enhance TCP performance, two of which are TCP timestamps and sequence number rollback protection (PAWS). \n\n There are security holes in the PAWS technology of TCP RFC 1323. If TCP timestamps are enabled, both endpoints of the TCP connection use the internal clock to mark the TCP header with the timestamp value. \n\n This vulnerability can occur if an attacker sends enough TCP PAWS packets to the vulnerable computer. An attacker can set the message timestamp to a large value. When the target machine processes this message, the internal timer will be updated to this value, which may cause all valid messages received afterwards to be discarded because these messages are considered too old or invalid. This technique may cause the target connection to deny service. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products TCP Timestamp Denial of Service\n\nSECUNIA ADVISORY ID:\nSA15393\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15393/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n>From remote\n\nOPERATING SYSTEM:\nCisco SN5400 Series Storage Routers\nhttp://secunia.com/product/2188/\nCisco MGX 8900 Series Multiservice Switches\nhttp://secunia.com/product/5117/\nCisco MGX 8800 Series Multiservice Switches\nhttp://secunia.com/product/5116/\nCisco MGX 8200 Series Edge Concentrators\nhttp://secunia.com/product/5115/\nCisco Content Services Switch 11000 Series (WebNS)\nhttp://secunia.com/product/1507/\nCisco Aironet 350 Series Access Point\nhttp://secunia.com/product/5114/\nCisco Aironet 1200 Series Access Point\nhttp://secunia.com/product/1929/\n\nDESCRIPTION:\nA vulnerability has been reported in some Cisco products, which can\nbe exploited by malicious people to cause a DoS (Denial of Service)\non active TCP sessions. \n\nSuccessful exploitation requires knowledge of IP address information\nof the source and destination of the TCP network connection. \n\nThe vulnerability affects the following products:\n* SN5400 series storage routers\n* CSS11000 series content services switches\n* AP350 and AP1200 series Access Points running VxWorks\n* MGX8200, MGX8800, and MGX8900 series WAN switches (only management\ninterfaces)\n\nSOLUTION:\nSN5400 series storage routers:\nThe vulnerability has been addressed by CSCin85370. \n\nCSS11000 series content services switches:\nThe vulnerability has been addressed by CSCeh40395. \n\nAP350 and AP1200 series Access Points:\nThe vendor recommends upgrading APs running VxWorks to Cisco IOS. \n\nMGX series WAN switches:\nThe vulnerability has been documented by CSCeh85125 and CSCeh85130. \n\nPROVIDED AND/OR DISCOVERED BY:\nUS-CERT credits Noritoshi Demizu. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml\n\nOTHER REFERENCES:\nUS-CERT VU#637934:\nhttp://www.kb.cert.org/vuls/id/637934\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Cisco has acknowledged\nthat various Cisco products are affected. \n\nThe published Internet-Draft details three types of attacks, which\nutilize the following ICMP messages to cause a negative impact on TCP\nconnections either terminating or originating from a vulnerable\ndevice. \n\n1) ICMP \"hard\" error messages\n2) ICMP \"fragmentation needed and Don't Fragment (DF) bit set\"\nmessages (known as PMTUD attacks)\n3) ICMP \"source quench\" messages\n\nThese attacks can all be exploited to cause TCP connection resets,\nreduce the throughput in existing TCP connections, or consume large\namounts of CPU and memory resources. \n\nNOTE: See the original advisory for a list of affected versions. \n\nSOLUTION:\nSee patch matrix in vendor advisory for information about fixes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "CNVD",
            id: "CNVD-2005-1944",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            db: "PACKETSTORM",
            id: "42527",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "37143",
         },
      ],
      trust: 3.6,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-11565",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#637934",
            trust: 3.8,
         },
         {
            db: "BID",
            id: "13676",
            trust: 3.6,
         },
         {
            db: "NVD",
            id: "CVE-2005-0356",
            trust: 3.4,
         },
         {
            db: "SECUNIA",
            id: "15393",
            trust: 1.9,
         },
         {
            db: "SECUNIA",
            id: "15417",
            trust: 1.9,
         },
         {
            db: "SECUNIA",
            id: "18222",
            trust: 1.8,
         },
         {
            db: "SECUNIA",
            id: "18662",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
            trust: 0.7,
         },
         {
            db: "CNVD",
            id: "CNVD-2005-1944",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20050518 VULNERABILITY IN A VARIANT OF THE TCP TIMESTAMPS OPTION",
            trust: 0.6,
         },
         {
            db: "FREEBSD",
            id: "FREEBSD-SA-05:15",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "20635",
            trust: 0.6,
         },
         {
            db: "SCO",
            id: "SCOSA-2005.64",
            trust: 0.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "1008",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-11565",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "42527",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "37673",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "37672",
            trust: 0.1,
         },
         {
            db: "SECUNIA",
            id: "14904",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "37143",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "CNVD",
            id: "CNVD-2005-1944",
         },
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "PACKETSTORM",
            id: "42527",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "37143",
         },
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   id: "VAR-200505-0572",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
      ],
      trust: 0.47272727000000003,
   },
   last_update_date: "2023-12-18T11:01:20.830000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sn-20050518-tcpts",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml",
         },
         {
            title: "899480",
            trust: 0.8,
            url: "http://www.microsoft.com/technet/security/advisory/899480.mspx",
         },
         {
            title: "MS05-019",
            trust: 0.8,
            url: "http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx",
         },
         {
            title: "cisco-sn-20050518-tcpts",
            trust: 0.8,
            url: "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sn-20050518-tcpts-j.shtml",
         },
         {
            title: "899480",
            trust: 0.8,
            url: "http://www.microsoft.com/japan/technet/security/advisory/899480.mspx",
         },
         {
            title: "MS05-019",
            trust: 0.8,
            url: "http://www.microsoft.com/japan/technet/security/bulletin/ms05-019.mspx",
         },
         {
            title: "Multiple manufacturers TCP/IP Protocol stack implementation timestamp PAWS Remediation measures for remote denial of service vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=92344",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.3,
            url: "http://www.securityfocus.com/bid/13676",
         },
         {
            trust: 2.9,
            url: "http://www.kb.cert.org/vuls/id/637934",
         },
         {
            trust: 2.1,
            url: "http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml",
         },
         {
            trust: 2,
            url: "http://support.avaya.com/elmodocs2/security/asa-2006-032.htm",
         },
         {
            trust: 1.9,
            url: "http://www.ietf.org/rfc/rfc1323.txt",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/15417/",
         },
         {
            trust: 1.7,
            url: "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-05:15.tcp.asc",
         },
         {
            trust: 1.7,
            url: "ftp://ftp.sco.com/pub/updates/unixware/scosa-2005.64/scosa-2005.64.txt",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/15393",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/18222",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/18662",
         },
         {
            trust: 1.1,
            url: "http://www.ietf.org/rfc/rfc793.txt",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/20635",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0356",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/rfc/rfc0793.txt",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu%23637934/",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0356",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/20635",
         },
         {
            trust: 0.4,
            url: "http://openbsd.org/errata36.html#tcp",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.4,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/elmodocs2/security/asa-2005-148.pdf",
         },
         {
            trust: 0.3,
            url: "http://www.alaxala.com/jp/support/icmp-20050518.html",
         },
         {
            trust: 0.3,
            url: "http://www.freebsd.org/cgi/cvsweb.cgi/src/sys/netinet/tcp_input.c",
         },
         {
            trust: 0.3,
            url: "http://www.microsoft.com/technet/security/advisory/899480.mspx",
         },
         {
            trust: 0.3,
            url: "http://www.rtpro.yamaha.co.jp/rt/faq/tcpip/vu637934.html",
         },
         {
            trust: 0.3,
            url: "http://www.bluecoat.com/support/knowledge/advisory_tcp_can-2005-0356.html",
         },
         {
            trust: 0.3,
            url: "http://tech.f5.com/home/bigip-next/solutions/advisories/sol4743.html",
         },
         {
            trust: 0.3,
            url: "http://secunia.com/advisories/15393/",
         },
         {
            trust: 0.3,
            url: "http://secunia.com/secunia_vacancies/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/product/1507/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/18222/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/136/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/100/",
         },
         {
            trust: 0.1,
            url: "http://www.kb.cert.org/vuls/id/jgei-6abpp2",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5117/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5115/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5114/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/5116/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2188/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/1929/",
         },
         {
            trust: 0.1,
            url: "http://www.ietf.org/rfc/rfc1191.txt",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/56/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/182/",
         },
         {
            trust: 0.1,
            url: "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/14904/",
         },
         {
            trust: 0.1,
            url: "http://www.niscc.gov.uk/niscc/docs/al-20050412-00308.html",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/184/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/4907/",
         },
         {
            trust: 0.1,
            url: "http://www.ietf.org/rfc/rfc1122.txt",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/684/",
         },
         {
            trust: 0.1,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml",
         },
         {
            trust: 0.1,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml#software",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/183/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2270/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/53/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/3214/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "PACKETSTORM",
            id: "42527",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "37143",
         },
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            db: "CNVD",
            id: "CNVD-2005-1944",
         },
         {
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            db: "PACKETSTORM",
            id: "42527",
         },
         {
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            db: "PACKETSTORM",
            id: "37143",
         },
         {
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-05-18T00:00:00",
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            date: "2005-05-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2005-1944",
         },
         {
            date: "2005-05-31T00:00:00",
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            date: "2005-05-18T00:00:00",
            db: "BID",
            id: "13676",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            date: "2005-12-26T18:18:14",
            db: "PACKETSTORM",
            id: "42527",
         },
         {
            date: "2005-05-29T20:22:44",
            db: "PACKETSTORM",
            id: "37673",
         },
         {
            date: "2005-05-29T20:22:44",
            db: "PACKETSTORM",
            id: "37672",
         },
         {
            date: "2005-04-18T07:21:17",
            db: "PACKETSTORM",
            id: "37143",
         },
         {
            date: "2005-05-31T04:00:00",
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            date: "2005-05-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-08-23T00:00:00",
            db: "CERT/CC",
            id: "VU#637934",
         },
         {
            date: "2005-05-27T00:00:00",
            db: "CNVD",
            id: "CNVD-2005-1944",
         },
         {
            date: "2019-04-30T00:00:00",
            db: "VULHUB",
            id: "VHN-11565",
         },
         {
            date: "2006-05-17T23:29:00",
            db: "BID",
            id: "13676",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2005-000333",
         },
         {
            date: "2019-04-30T14:27:13.913000",
            db: "NVD",
            id: "CVE-2005-0356",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "TCP does not adequately validate segments before updating timestamp value",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#637934",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "13676",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200505-1247",
         },
      ],
      trust: 0.9,
   },
}

var-200309-0035
Vulnerability from variot

A "buffer management error" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ OpenSSH Project More distributed OpenSSH 3.7 (Portable Edition OpenSSH 3.7p1) Previously, there were deficiencies in buffer management. If a remote attacker receives a packet of a deliberate length that frees other nearby areas when releasing the buffer, the heap area can be destroyed. As a result, remote attackers who exploit this issue sshd Can be put into a denial of service, and arbitrary code execution has been suggested. The routine in which the problem exists is OpenSSH Others that are using similar routines since being used since the initial release of SSH The implementation of may also be affected. SSH Secure Shell/Ciso IOS Has been reported by the vendor to be unaffected by this issue. Also, F-Secure SSH about, 1.3.14 (for Unix) Previously affected, 2.x Since then, the vendor has reported that it will not be affected. Initially this problem (CAN-2003-0693) Is buffer.c Inside buffer_append_space() Discovered in the function, OpenSSH 3.7p1 It was solved with. However, since a similar problem was discovered in other places after that, this problem was solved. OpenSSH 3.7.1p1 Has been released. (CAN-2003-0695) In addition, memory management issues that are different from the above issues (CAN-2003-0682) Has also been reported, OpenSSH 3.7.1p2 It can be solved by updating to. still, Red Hat Linux About the vendor 2003 Year 9 Moon 17 Advisory published by date (RHSA-2003:279-17) Indicated in RPM Updates to the package, Turboinux About the vendor 2003 Year 9 Moon 24 Advisory published on date (TLSA-2003-53) All of these issues are due to updates to the packages indicated in (CAN-2003-0682/CAN-2003-0693/CAN-2003-0695) Can be eliminated.Please refer to the “Overview” for the impact of this vulnerability. The issue may cause a denial of service. This condition can reportedly be triggered by an overly large packet. There are also unconfirmed rumors of an exploit for this vulnerability circulating in the wild. OpenSSH has revised their advisory, pointing out a similar issue in the 'channels.c' source file and an additional issue in 'buffer.c'. Solar Designer has also reportedly pointed out additional instances of the problem that may also present vulnerabilities

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200309-0035",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 3.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "catalyst csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "60005.3",
         },
         {
            model: null,
            scope: null,
            trust: 1.6,
            vendor: "mandriva",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "openssh",
            scope: "lte",
            trust: 1,
            vendor: "openbsd",
            version: "3.7",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "4.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "50006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40005.1",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "appgate network security ab",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "apple computer",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cray",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cyclades",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "debian linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "f secure",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "foundry",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "guardian digital",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm eserver",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ingrian",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "juniper",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "mirapoint",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netbsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "network appliance",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "nokia",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openpkg",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openssh",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openwall gnu linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "riverstone",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "suse linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "slackware",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "tfs",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "trustix secure linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "vmware",
            version: null,
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.8,
            vendor: "openbsd",
            version: "3.7.1p1",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "1.1",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.0",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.1",
         },
         {
            model: "cobalt raq550",
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "9 (sparc)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "9 (x86)",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.5",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "7",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "8",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.00",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.04",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.11",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.22",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.23",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "7.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "7.2",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "7.3",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "8.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "9",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50005.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.2",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.6,
            vendor: "openbsd",
            version: "3.7",
         },
         {
            model: "solaris 9 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "9",
         },
         {
            model: "cobalt raq",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "550",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.2.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.2",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.9",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.8",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.7",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.6",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.5",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.4",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "2.0.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.7.2",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.7.1",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.7",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.6.3",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.6.2",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.5.18",
         },
         {
            model: "stonegate",
            scope: "eq",
            trust: 0.3,
            vendor: "stonesoft",
            version: "1.5.17",
         },
         {
            model: "os",
            scope: "eq",
            trust: 0.3,
            vendor: "snapgear",
            version: "1.8.4",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.22",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.19",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.19",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.19",
         },
         {
            model: "open server",
            scope: "eq",
            trust: 0.3,
            vendor: "sco",
            version: "5.0.7",
         },
         {
            model: "openssh-server-3.5p1-6.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-server-3.4p1-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-server-3.1p1-3.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-server-2.9p2-7.ia64.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-server-2.9p2-7.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-server-2.5.2p2-5.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-clients-3.5p1-6.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-clients-3.4p1-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-clients-3.1p1-3.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-clients-2.9p2-7.ia64.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-clients-2.9p2-7.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-clients-2.5.2p2-5.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-gnome-3.5p1-6.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-gnome-3.4p1-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-gnome-3.1p1-3.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-gnome-2.9p2-7.ia64.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-gnome-2.9p2-7.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-gnome-2.5.2p2-5.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-3.5p1-6.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-3.4p1-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-3.1p1-3.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-2.9p2-7.ia64.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-2.9p2-7.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-askpass-2.5.2p2-5.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-3.5p1-6.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-3.4p1-2.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-3.1p1-3.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-2.9p2-7.ia64.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-2.9p2-7.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "openssh-2.5.2p2-5.i386.rpm",
            scope: null,
            trust: 0.3,
            vendor: "redhat",
            version: null,
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.7",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.7",
         },
         {
            model: "p2",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.6.1",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.6.1",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.6.1",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.5",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.5",
         },
         {
            model: "p1-1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.4",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.4",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.4",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.3",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.3",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.2.3",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.2.2",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.2",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.1",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.1",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.0.2",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.0.2",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.0.1",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.0.1",
         },
         {
            model: "p1",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.0",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "3.0",
         },
         {
            model: "openssh",
            scope: "eq",
            trust: 0.3,
            vendor: "openssh",
            version: "2.9.9",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.3",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "openbsd",
            version: "3.2",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.6.1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.6",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.5.3",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.5.2",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.5.1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.5",
         },
         {
            model: "secureadmin for netcache",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "5.5",
         },
         {
            model: "secureadmin",
            scope: "eq",
            trust: 0.3,
            vendor: "netapp",
            version: "3.0",
         },
         {
            model: "networks serverironxl/g",
            scope: null,
            trust: 0.3,
            vendor: "foundry",
            version: null,
         },
         {
            model: "networks serverironxl",
            scope: null,
            trust: 0.3,
            vendor: "foundry",
            version: null,
         },
         {
            model: "networks serveriron800",
            scope: null,
            trust: 0.3,
            vendor: "foundry",
            version: null,
         },
         {
            model: "networks serveriron400",
            scope: null,
            trust: 0.3,
            vendor: "foundry",
            version: null,
         },
         {
            model: "networks serveriron",
            scope: "eq",
            trust: 0.3,
            vendor: "foundry",
            version: "7.1.09",
         },
         {
            model: "networks serveriron",
            scope: "eq",
            trust: 0.3,
            vendor: "foundry",
            version: "6.0",
         },
         {
            model: "networks serveriron t12",
            scope: "eq",
            trust: 0.3,
            vendor: "foundry",
            version: "5.1.10",
         },
         {
            model: "networks ironview",
            scope: null,
            trust: 0.3,
            vendor: "foundry",
            version: null,
         },
         {
            model: "networks fastiron",
            scope: "eq",
            trust: 0.3,
            vendor: "foundry",
            version: "7.1.09",
         },
         {
            model: "networks edgeiron 4802f",
            scope: "eq",
            trust: 0.3,
            vendor: "foundry",
            version: "0",
         },
         {
            model: "networks bigiron",
            scope: "eq",
            trust: 0.3,
            vendor: "foundry",
            version: "7.1.09",
         },
         {
            model: "ssh",
            scope: "eq",
            trust: 0.3,
            vendor: "f secure",
            version: "1.3.14",
         },
         {
            model: "open software",
            scope: "eq",
            trust: 0.3,
            vendor: "cray",
            version: "3.0",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.20.0.03",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10.2.06",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.10.1.02",
         },
         {
            model: "webns b4",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.10",
         },
         {
            model: "webns",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.10",
         },
         {
            model: "sn storage router sn5428-3.3.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "sn storage router sn5428-3.3.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "sn storage router sn5428-3.2.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "sn storage router sn5428-3.2.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "sn storage router sn5428-2.5.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "sn storage router sn5428-2-3.3.2-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "sn storage router sn5428-2-3.3.1-k9",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5428",
         },
         {
            model: "secure intrusion detection system",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "pgw2200 softswitch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "gss global site selector",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4480",
         },
         {
            model: "css11800 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11506 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11503 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11501 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11150 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11050 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "css11000 content services switch",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ciscoworks wireless lan solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1105",
         },
         {
            model: "ciscoworks hosting solution engine",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1105",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catos clr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(9)",
         },
         {
            model: "catos cv",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(19)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(18)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16.2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(15)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(14)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13.5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(1)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.1",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3(4)",
         },
         {
            model: "catalyst pan",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.111)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.110)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(2.13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.3(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(8)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(11)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "catalyst 4912g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(8)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst 2948g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29005.5(13)",
         },
         {
            model: "catalyst 2980g-a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 2980g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "openlinux workstation",
            scope: "eq",
            trust: 0.3,
            vendor: "caldera",
            version: "3.1.1",
         },
         {
            model: "openlinux server",
            scope: "eq",
            trust: 0.3,
            vendor: "caldera",
            version: "3.1.1",
         },
         {
            model: "coat systems sgme",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "2.1.6",
         },
         {
            model: "coat systems sg2 secure proxy",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "coat systems security gateway os",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "3.1",
         },
         {
            model: "coat systems security gateway os sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "2.1.5001",
         },
         {
            model: "coat systems security gateway os",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "2.1.9",
         },
         {
            model: "coat systems proxysg",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "0",
         },
         {
            model: "coat systems cacheos ca/sa",
            scope: "eq",
            trust: 0.3,
            vendor: "blue",
            version: "4.1.10",
         },
         {
            model: "os",
            scope: "ne",
            trust: 0.3,
            vendor: "snapgear",
            version: "1.8.5",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.22",
         },
         {
            model: "p1",
            scope: "ne",
            trust: 0.3,
            vendor: "openssh",
            version: "3.7.1",
         },
         {
            model: "openssh",
            scope: "ne",
            trust: 0.3,
            vendor: "openssh",
            version: "3.7.1",
         },
         {
            model: "p1",
            scope: "ne",
            trust: 0.3,
            vendor: "openssh",
            version: "3.7",
         },
         {
            model: "openssh",
            scope: "ne",
            trust: 0.3,
            vendor: "openssh",
            version: "3.7",
         },
         {
            model: "ssh",
            scope: "ne",
            trust: 0.3,
            vendor: "f secure",
            version: "1.3.15",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            db: "BID",
            id: "8628",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndIncluding: "3.7",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSH Security Advisory",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2003-0693",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: true,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2003-0693",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2003-0693",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#333628",
                  trust: 0.8,
                  value: "28.98",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200309-032",
                  trust: 0.6,
                  value: "CRITICAL",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A \"buffer management error\" in buffer_append_space of buffer.c for OpenSSH before 3.7 may allow remote attackers to execute arbitrary code by causing an incorrect amount of memory to be freed and corrupting the heap, a different vulnerability than CVE-2003-0695. While the full impact of these vulnerabilities are unclear, they may lead to memory corruption and a denial-of-service situation. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ OpenSSH Project More distributed OpenSSH 3.7 (Portable Edition OpenSSH 3.7p1) Previously, there were deficiencies in buffer management. If a remote attacker receives a packet of a deliberate length that frees other nearby areas when releasing the buffer, the heap area can be destroyed. As a result, remote attackers who exploit this issue sshd Can be put into a denial of service, and arbitrary code execution has been suggested. The routine in which the problem exists is OpenSSH Others that are using similar routines since being used since the initial release of SSH The implementation of may also be affected. SSH Secure Shell/Ciso IOS Has been reported by the vendor to be unaffected by this issue. Also, F-Secure SSH about, 1.3.14 (for Unix) Previously affected, 2.x Since then, the vendor has reported that it will not be affected. Initially this problem (CAN-2003-0693) Is buffer.c Inside buffer_append_space() Discovered in the function, OpenSSH 3.7p1 It was solved with. However, since a similar problem was discovered in other places after that, this problem was solved. OpenSSH 3.7.1p1 Has been released. (CAN-2003-0695) In addition, memory management issues that are different from the above issues (CAN-2003-0682) Has also been reported, OpenSSH 3.7.1p2 It can be solved by updating to. still, Red Hat Linux About the vendor 2003 Year 9 Moon 17 Advisory published by date (RHSA-2003:279-17) Indicated in RPM Updates to the package, Turboinux About the vendor 2003 Year 9 Moon 24 Advisory published on date (TLSA-2003-53) All of these issues are due to updates to the packages indicated in (CAN-2003-0682/CAN-2003-0693/CAN-2003-0695) Can be eliminated.Please refer to the “Overview” for the impact of this vulnerability. The issue may cause a denial of service.  This condition can reportedly be triggered by an overly large packet. \nThere are also unconfirmed rumors of an exploit for this vulnerability circulating in the wild. \nOpenSSH has revised their advisory, pointing out a similar issue in the 'channels.c' source file and an additional issue in 'buffer.c'.  Solar Designer has also reportedly pointed out additional instances of the problem that may also present vulnerabilities",
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            db: "BID",
            id: "8628",
         },
      ],
      trust: 2.61,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#333628",
            trust: 3.2,
         },
         {
            db: "NVD",
            id: "CVE-2003-0693",
            trust: 2.7,
         },
         {
            db: "XF",
            id: "13191",
            trust: 1.4,
         },
         {
            db: "BID",
            id: "8628",
            trust: 1.1,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2024/07/01/3",
            trust: 1,
         },
         {
            db: "SECUNIA",
            id: "10156",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
            trust: 0.8,
         },
         {
            db: "FULLDISC",
            id: "20030916 THE LOWDOWN ON SSH VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "FULLDISC",
            id: "20030915 NEW SSH EXPLOIT?",
            trust: 0.6,
         },
         {
            db: "FULLDISC",
            id: "20030915 OPENSSH REMOTE EXPLOIT",
            trust: 0.6,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:447",
            trust: 0.6,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:2719",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030916 OPENSSH BUFFER MANAGEMENT BUG ADVISORY",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030917 [OPENPKG-SA-2003.040] OPENPKG SECURITY ADVISORY (OPENSSH)",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030916 [SLACKWARE-SECURITY] OPENSSH SECURITY ADVISORY (SSA:2003-259-01)",
            trust: 0.6,
         },
         {
            db: "MANDRAKE",
            id: "MDKSA-2003:090",
            trust: 0.6,
         },
         {
            db: "CERT/CC",
            id: "CA-2003-24",
            trust: 0.6,
         },
         {
            db: "SUNALERT",
            id: "1000620",
            trust: 0.6,
         },
         {
            db: "DEBIAN",
            id: "DSA-383",
            trust: 0.6,
         },
         {
            db: "DEBIAN",
            id: "DSA-382",
            trust: 0.6,
         },
         {
            db: "TRUSTIX",
            id: "2003-0033",
            trust: 0.6,
         },
         {
            db: "REDHAT",
            id: "RHSA-2003:280",
            trust: 0.6,
         },
         {
            db: "REDHAT",
            id: "RHSA-2003:279",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            db: "BID",
            id: "8628",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   id: "VAR-200309-0035",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.38200912,
   },
   last_update_date: "2024-07-23T20:26:04.438000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "2003120401",
            trust: 0.8,
            url: "http://support.f-secure.com/enu/corporate/supportissue/ssh/comments/comments-issue-2003120401.shtml",
         },
         {
            title: "HPSBUX0311-302",
            trust: 0.8,
            url: "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0311-302",
         },
         {
            title: "HPSBUX0309-282",
            trust: 0.8,
            url: "http://www2.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0309-282",
         },
         {
            title: "HPSBUX0311-302",
            trust: 0.8,
            url: "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0311-302.html",
         },
         {
            title: "HPSBUX0309-282",
            trust: 0.8,
            url: "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0309-282.html",
         },
         {
            title: "openssh",
            trust: 0.8,
            url: "http://www.miraclelinux.com/support/update/data/openssh.html",
         },
         {
            title: "buffer.adv",
            trust: 0.8,
            url: "http://www.openssh.com/txt/buffer.adv",
         },
         {
            title: "RHSA-2003:279",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2003-279.html",
         },
         {
            title: "471",
            trust: 0.8,
            url: "http://www.ssh.com/company/newsroom/article/471/",
         },
         {
            title: "56862",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56862-1",
         },
         {
            title: "56861",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56861-1",
         },
         {
            title: "56862",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56862-3",
         },
         {
            title: "56861",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56861-3",
         },
         {
            title: "550 OpenSSH Security Update",
            trust: 0.8,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng&amp;nav=patchpage",
         },
         {
            title: "TLSA-2003-53",
            trust: 0.8,
            url: "http://www.turbolinux.com/security/2003/tlsa-2003-53.txt",
         },
         {
            title: "TLSA-2003-51",
            trust: 0.8,
            url: "http://www.turbolinux.com/security/2003/tlsa-2003-51.txt",
         },
         {
            title: "RHSA-2003:279",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-279j.html",
         },
         {
            title: "TLSA-2003-53",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2003/tlsa-2003-53j.txt",
         },
         {
            title: "TLSA-2003-51",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2003/tlsa-2003-51j.txt",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.7,
            url: "http://www.openssh.com/txt/buffer.adv",
         },
         {
            trust: 2.7,
            url: "http://www.cert.org/advisories/ca-2003-24.html",
         },
         {
            trust: 2.4,
            url: "http://www.kb.cert.org/vuls/id/333628",
         },
         {
            trust: 1.6,
            url: "http://www.redhat.com/support/errata/rhsa-2003-280.html",
         },
         {
            trust: 1.6,
            url: "http://www.debian.org/security/2003/dsa-383",
         },
         {
            trust: 1.6,
            url: "http://www.debian.org/security/2003/dsa-382",
         },
         {
            trust: 1.6,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000620.1-1",
         },
         {
            trust: 1.6,
            url: "http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010146.html",
         },
         {
            trust: 1.6,
            url: "http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010135.html",
         },
         {
            trust: 1.6,
            url: "http://lists.grok.org.uk/pipermail/full-disclosure/2003-september/010103.html",
         },
         {
            trust: 1.6,
            url: "http://www.mandriva.com/security/advisories?name=mdksa-2003:090",
         },
         {
            trust: 1.4,
            url: "http://xforce.iss.net/xforce/xfdb/13191",
         },
         {
            trust: 1.2,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106373247528528&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=106373247528528&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=106373546332230&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=106374466212309&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=106381396120332&w=2",
         },
         {
            trust: 1,
            url: "http://marc.info/?l=bugtraq&m=106381409220492&w=2",
         },
         {
            trust: 1,
            url: "http://www.openwall.com/lists/oss-security/2024/07/01/3",
         },
         {
            trust: 1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/13191",
         },
         {
            trust: 1,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2719",
         },
         {
            trust: 1,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a447",
         },
         {
            trust: 0.8,
            url: "http://www.mindrot.org/pipermail/openssh-unix-announce/2003-september/000062.html",
         },
         {
            trust: 0.8,
            url: "http://www.freebsd.org/cgi/cvsweb.cgi/ports/security/openssh/files/patch-buffer.c",
         },
         {
            trust: 0.8,
            url: "http://www.secunia.com/advisories/10156/",
         },
         {
            trust: 0.8,
            url: "http://www.ciac.org/ciac/bulletins/n-151.shtml",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0693",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2003/wr033801.txt",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnca-2003-24",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/tr/trca-2003-24",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0693",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/8628",
         },
         {
            trust: 0.8,
            url: "http://www.isskk.co.jp/support/techinfo/general/openssh144.html",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106381409220492&w=2",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106381396120332&w=2",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106374466212309&w=2",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106373546332230&w=2",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:447",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2719",
         },
         {
            trust: 0.3,
            url: "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.368193",
         },
         {
            trust: 0.3,
            url: "http://www.bluecoat.com/downloads/support/bcs_openssh_vulnerability.pdf",
         },
         {
            trust: 0.3,
            url: "http://www.openwall.com/owl/changes-current.shtml",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20030917-openssh.shtml",
         },
         {
            trust: 0.3,
            url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000739",
         },
         {
            trust: 0.3,
            url: "http://www.freebsd.org/cgi/cvsweb.cgi/src/crypto/openssh/buffer.c.diff?r1=1.1.1.6&r2=1.1.1.7&f=h",
         },
         {
            trust: 0.3,
            url: "http://www.f-secure.com/support/technical/ssh/ssh1_openssh_buffer_management.shtml",
         },
         {
            trust: 0.3,
            url: "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm",
         },
         {
            trust: 0.3,
            url: "http://www.netapp.com/support/",
         },
         {
            trust: 0.3,
            url: "http://www.stonesoft.com/document/art/3031.html",
         },
         {
            trust: 0.3,
            url: "http://www.foundrynet.com/solutions/advisories/openssh333628.html",
         },
         {
            trust: 0.3,
            url: "http://www.netscreen.com/services/security/alerts/openssh_1.jsp",
         },
         {
            trust: 0.3,
            url: "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2967067.htm",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56861",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56862",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng&nav=patchpage",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/patches/linux/security.html",
         },
         {
            trust: 0.3,
            url: "http://www.yellowdoglinux.com/resources/errata/ydu-20030917-1.txt",
         },
         {
            trust: 0.3,
            url: "/archive/1/337921",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            db: "BID",
            id: "8628",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            db: "BID",
            id: "8628",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2003-09-16T00:00:00",
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            date: "2003-09-16T00:00:00",
            db: "BID",
            id: "8628",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            date: "2003-09-22T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            date: "2003-09-22T04:00:00",
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-08-12T00:00:00",
            db: "CERT/CC",
            id: "VU#333628",
         },
         {
            date: "2009-11-05T23:47:00",
            db: "BID",
            id: "8628",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2003-000274",
         },
         {
            date: "2006-03-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
         {
            date: "2024-07-01T11:15:03.240000",
            db: "NVD",
            id: "CVE-2003-0693",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "OpenSSH contains buffer management errors",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#333628",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Boundary Condition Error",
      sources: [
         {
            db: "BID",
            id: "8628",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200309-032",
         },
      ],
      trust: 0.9,
   },
}

var-200107-0161
Vulnerability from variot

Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. Due to a problem parsing carriage return/line feeds in RFC822 format mail messages, The Bat! mail client may permaturely detect the end of a mail message, causing an error to occur. This error may prevent the mail user from retrieving other mail messages until the message with the error is removed. "The Bat!" is an MUA for Windows by Rit Research Labs. "The Bat!" is vulnerable to a remote denial of service attack. Email messages in which carriage return (CR) characters are not followed by a linefeed (LF) can cause "The Bat!" to incorrectly interpret the message's structure. This can lead "The Bat!" to read text in the message body as a response from the POP3 server. The current (corrupt) message will not be deleted from the server, and the mail download process will stop. As a result, the user will remain unable to receive new email messages from the affected POP3 account. This leads to network instability and denial of service

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200107-0161",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 2.4,
            vendor: "lotus",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(1c\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "4.5.10",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(4b\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "4.5\\(11\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(2\\)",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "rit",
            version: null,
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.101",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.51",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.49",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.48",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.47",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.46",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.45",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.44",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.43",
         },
         {
            model: "research labs the bat! f",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.42",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.42",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.41",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.39",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.36",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.35",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.34",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.33",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.32",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.31",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.22",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.21",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.19",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.18",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.17",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.15",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.14",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.5",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.1",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.043",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.041",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.039",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.036",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.035",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.032",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.031",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.029",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.028",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.015",
         },
         {
            model: "research labs the bat!",
            scope: "eq",
            trust: 0.3,
            vendor: "rit",
            version: "1.011",
         },
         {
            model: "research labs the bat!",
            scope: "ne",
            trust: 0.3,
            vendor: "rit",
            version: "1.52",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "catos",
            version: "4.5(11)",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "catos",
            version: "4.5.10",
         },
         {
            model: "5.5",
            scope: null,
            trust: 0.2,
            vendor: "catos",
            version: null,
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "catos",
            version: "5.5(6)",
         },
         {
            model: "6.1",
            scope: null,
            trust: 0.2,
            vendor: "catos",
            version: null,
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "catos",
            version: "6.1(2)",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "catos",
            version: "6.1.2",
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            db: "BID",
            id: "2636",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(11\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(1c\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4b\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Reported to bugtraq by 3APA3A <3APA3A@SECURITY.NNOV.RU> on Wed, 18 Apr, 2001.",
      sources: [
         {
            db: "BID",
            id: "2636",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2001-0429",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "IVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.2,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.9 [IVD]",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-3248",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2001-0429",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#676552",
                  trust: 0.8,
                  value: "10.50",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#601312",
                  trust: 0.8,
                  value: "9.98",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#555464",
                  trust: 0.8,
                  value: "4.25",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#310816",
                  trust: 0.8,
                  value: "1.62",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200107-020",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "IVD",
                  id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
                  trust: 0.2,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-3248",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. Due to a problem parsing carriage return/line feeds in RFC822 format mail messages, The Bat! mail client may permaturely detect the end of a mail message, causing an error to occur.  This error may prevent the mail user from retrieving other mail messages until the message with the error is removed. \"The Bat!\" is an MUA for Windows by Rit Research Labs. \n\"The Bat!\" is vulnerable to a remote denial of service attack. Email messages in which carriage return (CR) characters are not followed by a linefeed (LF) can cause \"The Bat!\" to incorrectly interpret the message's structure.  This can lead \"The Bat!\" to read text in the message body as a response from the POP3 server.  The current (corrupt) message will not be deleted from the server, and the mail download process will stop. \nAs a result, the user will remain unable to receive new email messages from the affected POP3 account. This leads to network instability and denial of service",
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
         {
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            db: "BID",
            id: "2636",
         },
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
         },
      ],
      trust: 4.32,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2001-0429",
            trust: 1.9,
         },
         {
            db: "BID",
            id: "2604",
            trust: 1.7,
         },
         {
            db: "BID",
            id: "2636",
            trust: 1.1,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
            trust: 0.9,
         },
         {
            db: "BID",
            id: "2571",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "6349",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#676552",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "6347",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2565",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2599",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "6350",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "6423",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
            trust: 0.8,
         },
         {
            db: "CISCO",
            id: "20010416 CATALYST 5000 SERIES 802.1X VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "CIAC",
            id: "L-072",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "6379",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "8021",
            trust: 0.6,
         },
         {
            db: "IVD",
            id: "BBED9956-23CE-11E6-ABEF-000C29C66E3D",
            trust: 0.2,
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
         },
         {
            db: "BID",
            id: "2636",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   id: "VAR-200107-0161",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
         },
      ],
      trust: 0.03,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "ICS",
            ],
            sub_category: null,
            trust: 0.2,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
      ],
   },
   last_update_date: "2024-07-23T19:43:52.016000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.4,
            url: "http://www.securityfocus.com/advisories/3208",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/2604",
         },
         {
            trust: 1.7,
            url: "http://www.ciac.org/ciac/bulletins/l-072.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2571",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/6349.php",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2565",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/6347.php",
         },
         {
            trust: 0.8,
            url: "http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c?openview&start=3.111&count=30&expand=3.126#3.126",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2599",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/6350.php",
         },
         {
            trust: 0.8,
            url: "http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c/59719a1dd92c03e385256a4d0073766b?opendocument",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2636",
         },
         {
            trust: 0.8,
            url: "http://www.ritlabs.com/the_bat/index.html",
         },
         {
            trust: 0.8,
            url: "http://www.security.nnov.ru/search/news.asp?binid=1136",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/6423.php",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/static/6379.php",
         },
         {
            trust: 0.3,
            url: "http://www.thebat.net",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
         },
         {
            db: "BID",
            id: "2636",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            db: "VULHUB",
            id: "VHN-3248",
         },
         {
            db: "BID",
            id: "2636",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-07-02T00:00:00",
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            date: "2001-07-23T00:00:00",
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            date: "2001-07-12T00:00:00",
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            date: "2001-07-12T00:00:00",
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            date: "2001-06-01T00:00:00",
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            date: "2001-07-02T00:00:00",
            db: "VULHUB",
            id: "VHN-3248",
         },
         {
            date: "2001-04-18T00:00:00",
            db: "BID",
            id: "2636",
         },
         {
            date: "2001-07-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            date: "2001-07-02T04:00:00",
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-07-26T00:00:00",
            db: "CERT/CC",
            id: "VU#676552",
         },
         {
            date: "2001-07-17T00:00:00",
            db: "CERT/CC",
            id: "VU#601312",
         },
         {
            date: "2001-07-17T00:00:00",
            db: "CERT/CC",
            id: "VU#555464",
         },
         {
            date: "2001-08-30T00:00:00",
            db: "CERT/CC",
            id: "VU#310816",
         },
         {
            date: "2017-10-10T00:00:00",
            db: "VULHUB",
            id: "VHN-3248",
         },
         {
            date: "2001-04-18T00:00:00",
            db: "BID",
            id: "2636",
         },
         {
            date: "2005-05-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
         {
            date: "2017-10-10T01:29:43.517000",
            db: "NVD",
            id: "CVE-2001-0429",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst Switch Vulnerability",
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "unknown",
      sources: [
         {
            db: "IVD",
            id: "bbed9956-23ce-11e6-abef-000c29c66e3d",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200107-020",
         },
      ],
      trust: 0.8,
   },
}

var-200110-0004
Vulnerability from variot

Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements. The Cisco IOS contains a denial-of-service vulnerability that allows nearby remote attackers to crash or temporarily disable affected network devices. CDP is implemented with some releases of the Cisco Internet Operating System. It is possible for a host on a local segment of network to cause a Cisco router to become unstable, and potentially stop routing traffic by generating large amounts of CDP traffic. This protocol can not be routed across routers to remote network segments. This could lead to the ceasing of operation of Cisco routers, and a denial of service

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200110-0004",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(19\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0\\(5.1\\)xp",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "4.5\\(1\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "11.3\\(11\\)b",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.19",
         },
         {
            model: "ios b",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.11",
         },
         {
            model: "ios 12.0 xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            db: "BID",
            id: "3412",
         },
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:11.3\\(11\\)b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This vulnerability was discovered by FX <fx@phenoelit.de>, and announced via Bugtraq on October 9, 2001.",
      sources: [
         {
            db: "BID",
            id: "3412",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2001-1071",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-3876",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2001-1071",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#139491",
                  trust: 0.8,
                  value: "19.69",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200110-033",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-3876",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            db: "VULHUB",
            id: "VHN-3876",
         },
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements. The Cisco IOS contains a denial-of-service vulnerability that allows nearby remote attackers to crash or temporarily disable affected network devices. \nCDP is implemented with some releases of the Cisco Internet Operating System.  It is possible for a host on a local segment of network to cause a Cisco router to become unstable, and potentially stop routing traffic by generating large amounts of CDP traffic.  This protocol can not be routed across routers to remote network segments. \nThis could lead to the ceasing of operation of Cisco routers, and a denial of service",
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            db: "BID",
            id: "3412",
         },
         {
            db: "VULHUB",
            id: "VHN-3876",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#139491",
            trust: 2.5,
         },
         {
            db: "BID",
            id: "3412",
            trust: 2,
         },
         {
            db: "NVD",
            id: "CVE-2001-1071",
            trust: 1.7,
         },
         {
            db: "OSVDB",
            id: "1969",
            trust: 1.7,
         },
         {
            db: "BUGTRAQ",
            id: "20011009 CISCO SYSTEMS - VULNERABILITY IN CDP",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20011009 CISCO CDP ATTACKS",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "7242",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-3876",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            db: "VULHUB",
            id: "VHN-3876",
         },
         {
            db: "BID",
            id: "3412",
         },
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   id: "VAR-200110-0004",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-3876",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:26:12.877000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/3412",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/archive/1/219257",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/archive/1/219305",
         },
         {
            trust: 1.7,
            url: "http://www.kb.cert.org/vuls/id/139491",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/1969",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242",
         },
         {
            trust: 0.8,
            url: "http://www.phenoelit.de/irpas/",
         },
         {
            trust: 0.8,
            url: "http://www.phenoelit.de/stuff/ciscocdp.txt",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/archive/82/83299",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/static/7242.php",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            db: "VULHUB",
            id: "VHN-3876",
         },
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            db: "VULHUB",
            id: "VHN-3876",
         },
         {
            db: "BID",
            id: "3412",
         },
         {
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-10-10T00:00:00",
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            date: "2001-10-09T00:00:00",
            db: "VULHUB",
            id: "VHN-3876",
         },
         {
            date: "2001-10-09T00:00:00",
            db: "BID",
            id: "3412",
         },
         {
            date: "2001-10-09T04:00:00",
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            date: "2001-10-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-10-11T00:00:00",
            db: "CERT/CC",
            id: "VU#139491",
         },
         {
            date: "2017-10-10T00:00:00",
            db: "VULHUB",
            id: "VHN-3876",
         },
         {
            date: "2001-10-09T00:00:00",
            db: "BID",
            id: "3412",
         },
         {
            date: "2017-10-10T01:29:59.250000",
            db: "NVD",
            id: "CVE-2001-1071",
         },
         {
            date: "2005-05-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS vulnerable to denial of service via Cisco Discovery Protocol",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#139491",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "unknown",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200110-033",
         },
      ],
      trust: 0.6,
   },
}

var-200307-0051
Vulnerability from variot

Cisco Catalyst is a family of business-grade switches distributed and maintained by CISCO. Cisco Catalyst does not properly handle non-standard TCP packet communication. A remote attacker can exploit this vulnerability to perform a denial of service attack on the switch device, causing legitimate users to fail to communicate properly. Introducing a TCP connection using eight non-standard TCP tag combinations, the Catalyst switch will stop the normal TCP response for some services. To re-use the functionality of this service, the switch needs to be restarted. These standard services, including HTTP, Telnet, and SSH, are not affected by this vulnerability, including console communications. This Cisco bug ID is: CSCdw52219. Because of this, an attacker may be able to deny legitimate user access to the switch

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200307-0051",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 3.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "4.5",
         },
         {
            model: null,
            scope: null,
            trust: 0.6,
            vendor: "no",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(9)",
         },
         {
            model: "catos cv",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13.5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(13)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(14)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(14)",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            db: "BID",
            id: "8149",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Vulnerability disclosed by Cisco.",
      sources: [
         {
            db: "BID",
            id: "8149",
         },
      ],
      trust: 0.3,
   },
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CNVD-2003-2105",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "CNVD",
                  id: "CNVD-2003-2105",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst is a family of business-grade switches distributed and maintained by CISCO. Cisco Catalyst does not properly handle non-standard TCP packet communication. A remote attacker can exploit this vulnerability to perform a denial of service attack on the switch device, causing legitimate users to fail to communicate properly. Introducing a TCP connection using eight non-standard TCP tag combinations, the Catalyst switch will stop the normal TCP response for some services. To re-use the functionality of this service, the switch needs to be restarted. These standard services, including HTTP, Telnet, and SSH, are not affected by this vulnerability, including console communications. This Cisco bug ID is: CSCdw52219.  Because of this, an attacker may be able to deny legitimate user access to the switch",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            db: "BID",
            id: "8149",
         },
      ],
      trust: 0.81,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "8149",
            trust: 0.9,
         },
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            db: "BID",
            id: "8149",
         },
      ],
   },
   id: "VAR-200307-0051",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
      ],
      trust: 0.95529557,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
      ],
   },
   last_update_date: "2022-05-17T01:44:50.822000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Cisco Catalyst Non-Standard TCP Tag Remote Denial of Service Vulnerability Patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/42616",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 0.9,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20030709-swtcp.shtml",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            db: "BID",
            id: "8149",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            db: "BID",
            id: "8149",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2003-07-09T00:00:00",
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            date: "2003-07-09T00:00:00",
            db: "BID",
            id: "8149",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-01-20T00:00:00",
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
         {
            date: "2003-07-09T00:00:00",
            db: "BID",
            id: "8149",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "8149",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst Non-Standard TCP Tag Remote Denial of Service Vulnerability",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2003-2105",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Failure to Handle Exceptional Conditions",
      sources: [
         {
            db: "BID",
            id: "8149",
         },
      ],
      trust: 0.3,
   },
}

var-200412-1218
Vulnerability from variot

Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string. There is a vulnerability that permits unauthorized access to several switch and router products manufactured by Cisco Systems. An attacker who gains access to an affected device can read and modify its configuration, creating a denial-of-service condition, an information leak, or both. Cisco IOS and CatOS are the network firmware developed and maintained by Cisco. The problem involves the design of the View Access Control MIB (VACM) used by Cisco firmware. Under some circumstances, it may be possible for a remote user to gain access to the Read-Write password. This could allow an attacker to change configuration settings on the device

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200412-1218",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xj",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xn",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.0xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.1xx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.1xv",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "12.0xv",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xm",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xh",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1cx",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0db",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1db",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0sc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xf",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xe",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xz",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0st",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1e",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xg",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ya",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0da",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xl",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xt",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1dc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ec",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xq",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xy",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1da",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xp",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0dc",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xs",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xk",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xi",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xr",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1aa",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xu",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1t",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1yb",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1xw",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0xd",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ex",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.1ea",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.0s",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0st",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ey",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0w5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0x",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This vulnerability announced in a Cisco Security Advisory.",
      sources: [
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2004-1775",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-10205",
                  impactScore: 2.9,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:P/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2004-1775",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#645400",
                  trust: 0.8,
                  value: "54.68",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200412-907",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-10205",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            db: "VULHUB",
            id: "VHN-10205",
         },
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string. There is a vulnerability that permits unauthorized access to several switch and router products manufactured by Cisco Systems.  An attacker who gains access to an affected device can read and modify its configuration, creating a denial-of-service condition, an information leak, or both. Cisco IOS and CatOS are the network firmware developed and maintained by Cisco. \nThe problem involves the design of the View Access Control MIB (VACM) used by Cisco firmware.  Under some circumstances, it may be possible for a remote user to gain access to the Read-Write password.  This could allow an attacker to change configuration settings on the device",
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "VULHUB",
            id: "VHN-10205",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#645400",
            trust: 2.5,
         },
         {
            db: "BID",
            id: "5030",
            trust: 2,
         },
         {
            db: "NVD",
            id: "CVE-2004-1775",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20041008 CISCO IOS SOFTWARE MULTIPLE SNMP COMMUNITY STRING VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "6179",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-10205",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            db: "VULHUB",
            id: "VHN-10205",
         },
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   id: "VAR-200412-1218",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-10205",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T12:40:43.725000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.8,
            url: "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/5030",
         },
         {
            trust: 1.7,
            url: "http://www.kb.cert.org/vuls/id/645400",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179",
         },
         {
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/759/ipj_1-3/ipj_1-3_snmpv3_1.html",
         },
         {
            trust: 0.8,
            url: "http://www.electricrain.com/edavis/usm.html",
         },
         {
            trust: 0.8,
            url: "http://www.electricrain.com/edavis/vacm.html",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/rfc/rfc2574.txt",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/rfc/rfc2575.txt",
         },
         {
            trust: 0.8,
            url: "http://www.ietf.org/rfc/rfc2576.txt",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/6179",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            db: "VULHUB",
            id: "VHN-10205",
         },
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            db: "VULHUB",
            id: "VHN-10205",
         },
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-05-01T00:00:00",
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            date: "2004-12-31T00:00:00",
            db: "VULHUB",
            id: "VHN-10205",
         },
         {
            date: "2002-06-16T00:00:00",
            db: "BID",
            id: "5030",
         },
         {
            date: "2004-12-31T05:00:00",
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            date: "2004-12-31T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2002-03-05T00:00:00",
            db: "CERT/CC",
            id: "VU#645400",
         },
         {
            date: "2017-07-11T00:00:00",
            db: "VULHUB",
            id: "VHN-10205",
         },
         {
            date: "2002-06-16T00:00:00",
            db: "BID",
            id: "5030",
         },
         {
            date: "2017-07-11T01:31:20.670000",
            db: "NVD",
            id: "CVE-2004-1775",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS/CatOS exposes read-write SNMP community string via traversal of View-based Access Control MIB (VACM) using read-only community string",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#645400",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Design Error",
      sources: [
         {
            db: "BID",
            id: "5030",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200412-907",
         },
      ],
      trust: 0.9,
   },
}

var-200710-0368
Vulnerability from variot

Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet. (CSCsj56438, CSCsb45696, CSCsc55249)Crafted by a third party EAP Responsse Identity Device restarts due to packet, denial of service (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to cause the affected devices to reload, denying service to legitimate users. Repeat attacks will result in a prolonged denial-of-service condition. Cisco IOS is the operating system used in Cisco networking equipment.


Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure.

The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. This can be exploited to reboot an affected device. http://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml

PROVIDED AND/OR DISCOVERED BY: The vendor credits Laurent Butti, Julien Tinn\xe8s and Franck Veysset of France Telecom Group.

ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200710-0368",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios 12.3",
            scope: null,
            trust: 10.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2",
            scope: null,
            trust: 9.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t",
            scope: null,
            trust: 4.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s",
            scope: null,
            trust: 4.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 3.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "ios 12.2 t",
            scope: null,
            trust: 3.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 12.1 e",
            scope: null,
            trust: 2.7,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e1",
            scope: null,
            trust: 2.7,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios 12.1",
            scope: null,
            trust: 2.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 2.2,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "ios 12.2 b",
            scope: null,
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "ios 12.3 t8",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sv",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sv1",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ex",
            scope: null,
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.3jec",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "8.4",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.3jea",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "8.5",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.3ja",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.3jeb",
         },
         {
            model: "ios 12.3 t4",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ja",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e4",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1",
            scope: null,
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "6.4",
         },
         {
            model: "ios 12.3 bc",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t2",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sg",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 se",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bx",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s1",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sv3",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e5",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e3",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec",
            scope: null,
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "12.4ja",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.2",
         },
         {
            model: "ios 12.3 t9",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t10",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ja1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ja",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xr",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ja1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sg1",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sv2",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t9",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t8",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e7",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew4",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew",
            scope: null,
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos glx",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "6.x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "7.x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "8.x",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.3",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.4",
         },
         {
            model: "ios 12.3 bc6",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg5",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yf",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t7",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t11",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jk",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t12",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xe4",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t5",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ey",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ex",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sra2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xn",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sg2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sb2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 a",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s6",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s4",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s13",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s11",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s9",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s8",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s14",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xh",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xa",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxa",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd3",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zl",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zk",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t16",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e8",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e6",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e2",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eb",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1a",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec1",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e9",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e10",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e12",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos 8.4 glx",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s13",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "management agents for tru64 unix",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "6.4(10)",
         },
         {
            model: "wireless lan service module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "wireless eap 12.4.xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.4.jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.4.ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.3.jec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.3.jeb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.3.jea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.3.ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "unified communications",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "ios -7-ja2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3",
         },
         {
            model: "ios 12.2xu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 12.3yz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ym",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3xx",
         },
         {
            model: "ios 12.3xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3xv",
         },
         {
            model: "ios 12.3xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3tpc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jeb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3jea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3bw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(9)",
         },
         {
            model: "ios 12.3 yi3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yi1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ya1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xy6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xy5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xy4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xx2d",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xu2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(7.7)",
         },
         {
            model: "ios 12.3 xr7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xr6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xr4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xr3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi8a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xi10a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(6)",
         },
         {
            model: "ios 12.3 b5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(5)",
         },
         {
            model: "ios 12.3 xq1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 tpc11a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 eo1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(23)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(22)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(20)",
         },
         {
            model: "ios 12.3 xe5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xe3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xa6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xa5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xa4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jl1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jk1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ja5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(18)",
         },
         {
            model: "ios 12.3 bc8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(16)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(15)",
         },
         {
            model: "ios 12.3 yx9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yx7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yx2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yu1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yt1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yq8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yq4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yq3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yq1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ym8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ym4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(13)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(12)",
         },
         {
            model: "ios 12.3 yz2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yz1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ys1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yk3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yk2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yk1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yf4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yf3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 yf2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xl3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(11)",
         },
         {
            model: "ios 12.3 a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(10)",
         },
         {
            model: "ios 12.2zy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ze",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ym",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ye",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2xv",
         },
         {
            model: "ios 12.2xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xb15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2vz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2uz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2tpc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2su",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2srb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sra",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2so",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sgb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sga",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2seg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sef",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2see",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sed",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sec",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2seb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sea",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2se",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sbc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2pi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2pb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2jk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ja",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2fz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2fy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2fx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ez",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ey",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ewa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ew",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2dx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2dd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2by",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zb7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yy3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yw3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yw2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 tpc10c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 tpc10b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 tpc10a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(7)",
         },
         {
            model: "ios 12.2 t1a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t0a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(6)",
         },
         {
            model: "ios 12.2 ca1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(5)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(46)",
         },
         {
            model: "ios 12.2 yb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xw1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xw",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xm2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xm",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xl4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mx1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mb3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mb13c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mb13b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mb12",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(4)",
         },
         {
            model: "ios 12.2 se1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 se5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 se2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 srb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sra3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(32)",
         },
         {
            model: "ios 12.2 sga3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sga1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sb3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(31)",
         },
         {
            model: "ios 12.2 bp",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(3)",
         },
         {
            model: "ios 12.2 sv4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(28)",
         },
         {
            model: "ios 12.2 sbc4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sbc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw4a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw3a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 seg3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 seg2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sef1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 see4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 see3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 see2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 see1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sed",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sec2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sec1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 seb4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 seb3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 seb2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 seb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 fy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 fx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ez1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ez",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ey3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ey2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(24)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(23.6)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(23)",
         },
         {
            model: "ios 12.2 ea9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ea6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(21)",
         },
         {
            model: "ios 12.2 se3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 eu2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 eu1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xu2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xt3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xt",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xq2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xk2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xk",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xj1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xj",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xi2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xi1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xh3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xh2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb14",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xa5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xa1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 dd3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 by2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 by",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(19)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(18.2)",
         },
         {
            model: "ios 12.2 zu1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf11",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe6b",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe6a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd7a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 so4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sfx4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ixb2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ixb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxb9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxb8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxb7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxb10",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(17)",
         },
         {
            model: "ios 12.2 zo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zn",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zl1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ys/1.2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ys",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xr2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t17",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sl1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2j",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2h",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc2c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 jk5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 jk4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 jk2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 cz3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 cx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc2i",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc2h",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc2f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(14.5)",
         },
         {
            model: "ios 12.2 za8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 za2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy03",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sx1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 su2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s19",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s18",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s16",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s15",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ze",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t14",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(13)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(12.05)",
         },
         {
            model: "ios 12.2 da9",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da8",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(12)",
         },
         {
            model: "ios 12.2 yz2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yx1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yv",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yp1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc3c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 pi",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(1.1)",
         },
         {
            model: "ios 12.2 xs1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xq",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 dx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(1)",
         },
         {
            model: "ios zx",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios zw",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios zu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios fz",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(6)",
         },
         {
            model: "ios 12.1 yf3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ye4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yb5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm6",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xl2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t7",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(27)",
         },
         {
            model: "ios 12.1 eb2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eb1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea5a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea4a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(22)",
         },
         {
            model: "ios 12.1 ew2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(20)",
         },
         {
            model: "ios 12.1 xf5",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xf4",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 fc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(19)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(18.4)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(18)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(16)",
         },
         {
            model: "ios 12.1 bc1",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ex2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1c",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e17",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e13",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ay",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(13)",
         },
         {
            model: "ios 12.1 ev01",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(12)",
         },
         {
            model: "ios 12.1 e14",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(11.1)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(11)",
         },
         {
            model: "ios 12.1 ey",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 aa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 dc2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 dc",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db2",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catos clr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5.3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(20)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19.2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(18)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(16)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(15)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "wireless eap 12.4.xw5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.4 ja",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "wireless eap 12.3 jec",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.4 ja2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 jec",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sra4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sb6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sed",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 se",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 fx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zy1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf9",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.6(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(9)",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "26139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jea:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jeb:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3jec:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.3ja:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Laurent Butti※ laurent.butti@orange-ftgroup.com",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2007-5651",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.1,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2007-5651",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-29013",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2007-5651",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200710-441",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-29013",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2007-5651",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet. (CSCsj56438, CSCsb45696, CSCsc55249)Crafted by a third party EAP Responsse Identity Device restarts due to packet, denial of service (DoS) There is a possibility of being put into a state. \nAn attacker can exploit this issue to cause the affected devices to reload, denying service to legitimate users. Repeat attacks will result in a prolonged denial-of-service condition. Cisco IOS is the operating system used in Cisco networking equipment. \n\n----------------------------------------------------------------------\n\nTry a new way to discover vulnerabilities that ALREADY EXIST in your\nIT infrastructure. \n\nThe Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT\nvulnerabilities in more than 4,700 different Windows applications. This can be exploited to reboot\nan affected device. \nhttp://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Laurent Butti, Julien Tinn\\xe8s and Franck Veysset of\nFrance Telecom Group. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            db: "BID",
            id: "26139",
         },
         {
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            db: "PACKETSTORM",
            id: "60301",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "26139",
            trust: 2.9,
         },
         {
            db: "NVD",
            id: "CVE-2007-5651",
            trust: 2.9,
         },
         {
            db: "SECUNIA",
            id: "27329",
            trust: 2.7,
         },
         {
            db: "SECTRACK",
            id: "1018842",
            trust: 2.6,
         },
         {
            db: "VUPEN",
            id: "ADV-2007-3566",
            trust: 1.8,
         },
         {
            db: "XF",
            id: "37300",
            trust: 1.4,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
            trust: 0.8,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:5288",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20071019 EXTENSIBLE AUTHENTICATION PROTOCOL VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-29013",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2007-5651",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "60301",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            db: "BID",
            id: "26139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            db: "PACKETSTORM",
            id: "60301",
         },
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   id: "VAR-200710-0368",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-29013",
         },
      ],
      trust: 0.9436655770000001,
   },
   last_update_date: "2023-12-18T12:53:03.604000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sr-20071019-eap",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml",
         },
         {
            title: "wifuzzit",
            trust: 0.1,
            url: "https://github.com/0xd012/wifuzzit ",
         },
         {
            title: "wifuzzit",
            trust: 0.1,
            url: "https://github.com/plexone2019/wifuzzit ",
         },
         {
            title: "wifuzzit",
            trust: 0.1,
            url: "https://github.com/wi-fi-analyzer/wifuzzit ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.6,
            url: "http://www.securityfocus.com/bid/26139",
         },
         {
            trust: 2.6,
            url: "http://www.securitytracker.com/id?1018842",
         },
         {
            trust: 1.8,
            url: "http://www.cisco.com/en/us/products/products_security_response09186a00808de8bb.html",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/27329",
         },
         {
            trust: 1.4,
            url: "http://www.frsirt.com/english/advisories/2007/3566",
         },
         {
            trust: 1.4,
            url: "http://xforce.iss.net/xforce/xfdb/37300",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5288",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2007/3566",
         },
         {
            trust: 1.2,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300",
         },
         {
            trust: 0.9,
            url: "http://secunia.com/advisories/27329/",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5651",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5651",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5288",
         },
         {
            trust: 0.4,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20071019-eap.shtml",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://www.rapid7.com/db/vulnerabilities/cisco-ios-cve-2007-5651",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://github.com/0xd012/wifuzzit",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/network_software_inspector/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/527/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/3564/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/182/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/185/",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            db: "BID",
            id: "26139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            db: "PACKETSTORM",
            id: "60301",
         },
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            db: "BID",
            id: "26139",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            db: "PACKETSTORM",
            id: "60301",
         },
         {
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2007-10-23T00:00:00",
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            date: "2007-10-23T00:00:00",
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            date: "2007-10-19T00:00:00",
            db: "BID",
            id: "26139",
         },
         {
            date: "2007-11-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            date: "2007-10-23T02:42:45",
            db: "PACKETSTORM",
            id: "60301",
         },
         {
            date: "2007-10-23T21:47:00",
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            date: "2007-10-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-09-29T00:00:00",
            db: "VULHUB",
            id: "VHN-29013",
         },
         {
            date: "2017-09-29T00:00:00",
            db: "VULMON",
            id: "CVE-2007-5651",
         },
         {
            date: "2015-05-07T17:34:00",
            db: "BID",
            id: "26139",
         },
         {
            date: "2007-11-06T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
         {
            date: "2017-09-29T01:29:40.003000",
            db: "NVD",
            id: "CVE-2007-5651",
         },
         {
            date: "2009-03-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Product  EAP Service disruption due to packet processing deficiencies  (DoS) Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2007-000894",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200710-441",
         },
      ],
      trust: 0.6,
   },
}

var-200806-0575
Vulnerability from variot

SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. Successfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. Net-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. Vulnerabilities exist in Net-SNMP's handling of authentication. Net-SNMP's authentication code depends on the length of the HMAC length specified in the user input to read the length to be checked. If the user provides a single-byte HMAC code in the authentication code field, only the first byte will be checked, so there will be a 1/256 probability of matching the correct HMAC and Through authentication, this greatly improves the success rate of brute force guessing. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


               VMware Security Advisory

Advisory ID: VMSA-2008-0017 Synopsis: Updated ESX packages for libxml2, ucd-snmp, libtiff Issue date: 2008-10-31 Updated on: 2008-10-31 (initial release of advisory) CVE numbers: CVE-2008-3281 CVE-2008-0960 CVE-2008-2327


  1. Summary

Updated ESX packages for libxml2, ucd-snmp, libtiff.

  1. Relevant releases

ESX 3.0.3 without patch ESX303-200810503-SG ESX 3.0.2 without patch ESX-1006968 ESX 2.5.5 before Upgrade Patch 10 ESX 2.5.4 before Upgrade Patch 21

NOTE: Extended support (Security and Bug fixes) for ESX 3.0.2 ended on 2008-10-29. Extended support (Security and Bug fixes) for ESX 2.5.4 ended on 2008-10-08.

     Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08. Users
     should plan to upgrade to ESX 3.0.3 and preferably to the newest
     release available.
  1. Problem Description

a. Updated ESX Service Console package libxml2

A denial of service flaw was found in the way libxml2 processes
certain content. If an application that is linked against
libxml2 processes malformed XML content, the XML content might
cause the application to stop responding.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-3281 to this issue.

The following table lists what action remediates the vulnerability
(column 4) if a solution is available.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VirtualCenter  any       Windows  not affected

hosted         any       any      not affected

ESXi           3.5       ESXi     not affected

ESX            3.5       ESX      affected, patch pending
ESX            3.0.3     ESX      ESX303-200810503-SG
ESX            3.0.2     ESX      ESX-1006968
ESX            2.5.5     ESX      ESX 2.5.5 upgrade patch 10 or later
ESX            2.5.4     ESX      ESX 2.5.4 upgrade patch 21

* hosted products are VMware Workstation, Player, ACE, Server, Fusion.

b. Updated ESX Service Console package ucd-snmp

A flaw was found in the way ucd-snmp checks an SNMPv3 packet's
Keyed-Hash Message Authentication Code. An attacker could use
this flaw to spoof an authenticated SNMPv3 packet.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-0960 to this issue.

The following table lists what action remediates the vulnerability
(column 4) if a solution is available.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VirtualCenter  any       Windows  not affected

hosted         any       any      not affected

ESXi           3.5       ESXi     not affected

ESX            3.5       ESX      not affected
ESX            3.0.3     ESX      not affected
ESX            3.0.2     ESX      not affected
ESX            2.5.5     ESX      ESX 2.5.5 upgrade patch 10 or later
ESX            2.5.4     ESX      ESX 2.5.4 upgrade patch 21

* hosted products are VMware Workstation, Player, ACE, Server, Fusion.

c. Updated third party library libtiff

Multiple uses of uninitialized values were discovered in libtiff's
Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker
could create a carefully crafted LZW-encoded TIFF file that would
cause an application linked with libtiff to crash or, possibly,
execute arbitrary code.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2008-2327 to this issue.

The following table lists what action remediates the vulnerability
(column 4) if a solution is available.

VMware         Product   Running  Replace with/
Product        Version   on       Apply Patch
=============  ========  =======  =================
VirtualCenter  any       Windows  not affected

hosted         any       any      not affected

ESXi           3.5       ESXi     not affected

ESX            3.5       ESX      not affected
ESX            3.0.3     ESX      not affected
ESX            3.0.2     ESX      not affected
ESX            2.5.5     ESX      ESX 2.5.5 upgrade patch 10 or later
ESX            2.5.4     ESX      ESX 2.5.4 upgrade patch 21

* hosted products are VMware Workstation, Player, ACE, Server, Fusion.
  1. Solution

Please review the patch/release notes for your product and version and verify the md5sum of your downloaded file.

ESX


ESX 3.0.3 patch ESX303-200810503-SG http://download3.vmware.com/software/vi/ESX303-200810503-SG.zip md5sum: e687313e58377be41f6e6b767dfbf268 http://kb.vmware.com/kb/1006971

ESX 3.0.2 patch ESX-1006968 http://download3.vmware.com/software/vi/ESX-1006968.tgz md5sum: fc9e30cff6f03a209e6a275254fa6719 http://kb.vmware.com/kb/1006968

VMware ESX 2.5.5 Upgrade Patch 10 http://download3.vmware.com/software/esx/esx-2.5.5-119702-upgrade.tar.gz md5sum: 2ee87cdd70b1ba84751e24c0bd8b4621 http://vmware.com/support/esx25/doc/esx-255-200810-patch.html

VMware ESX 2.5.4 Upgrade Patch 21 http://download3.vmware.com/software/esx/esx-2.5.4-119703-upgrade.tar.gz md5sum: d791be525c604c852a03dd7df0eabf35 http://vmware.com/support/esx25/doc/esx-254-200810-patch.html

  1. References

CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327


  1. Change log

2008-10-31 VMSA-2008-0017 Initial security advisory after release of ESX 3.0.3, ESX 3.0.2, ESX 2.5.5 and ESX 2.5.4 patches on 2008-10-30.


  1. Contact

E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  • security-announce at lists.vmware.com
  • bugtraq at securityfocus.com
  • full-disclosure at lists.grok.org.uk

E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055

VMware Security Center http://www.vmware.com/security

VMware security response policy http://www.vmware.com/support/policies/security_response.html

General support life cycle policy http://www.vmware.com/support/policies/eos.html

VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html

Copyright 2008 VMware Inc. All rights reserved. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200808-02


                                        http://security.gentoo.org/

Severity: Normal Title: Net-SNMP: Multiple vulnerabilities Date: August 06, 2008 Bugs: #222265, #225105 ID: 200808-02


Synopsis

Multiple vulnerabilities in Net-SNMP allow for authentication bypass in snmpd and execution of arbitrary code in Perl applications using Net-SMNP.

Background

Net-SNMP is a collection of tools for generating and retrieving SNMP data.

Affected packages

-------------------------------------------------------------------
 Package                /  Vulnerable  /                Unaffected
-------------------------------------------------------------------

1 net-analyzer/net-snmp < 5.4.1.1 >= 5.4.1.1

Description

Wes Hardaker reported that the SNMPv3 HMAC verification relies on the client to specify the HMAC length (CVE-2008-0960). John Kortink reported a buffer overflow in the Perl bindings of Net-SNMP when processing the OCTETSTRING in an attribute value pair (AVP) received by an SNMP agent (CVE-2008-2292).

Impact

An attacker could send SNMPv3 packets to an instance of snmpd providing a valid user name and an HMAC length value of 1, and easily conduct brute-force attacks to bypass SNMP authentication. An attacker could further entice a user to connect to a malicious SNMP agent with an SNMP client using the Perl bindings, possibly resulting in the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All Net-SNMP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1.1"

References

[ 1 ] CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 [ 2 ] CVE-2008-2292 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-200808-02.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us.

License

Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


                    SUSE Security Announcement

    Package:                net-snmp
    Announcement ID:        SUSE-SA:2008:039
    Date:                   Fri, 01 Aug 2008 13:00:00 +0000
    Affected Products:      openSUSE 10.2
                            openSUSE 10.3
                            openSUSE 11.0
                            SUSE SLES 9
                            Novell Linux Desktop 9
                            Open Enterprise Server
                            Novell Linux POS 9
                            SUSE Linux Enterprise Desktop 10 SP1
                            SLE SDK 10 SP1
                            SLE SDK 10 SP2
                            SUSE Linux Enterprise Server 10 SP1
                            SUSE Linux Enterprise Desktop 10 SP2
                            SUSE Linux Enterprise Server 10 SP2
    Vulnerability Type:     authentication bypass, denial-of-service
    Severity (1-10):        6
    SUSE Default Package:   no
    Cross-References:       CVE-2008-0960
                            CVE-2008-2292

Content of This Advisory:
    1) Security Vulnerability Resolved:
        - authentication bypass
        - denial-of-service
       Problem Description
    2) Solution or Work-Around
    3) Special Instructions and Notes
    4) Package Location and Checksums
    5) Pending Vulnerabilities, Solutions, and Work-Arounds:
        - viewvc/subversion
    6) Authenticity Verification and Additional Information

1) Problem Description and Brief Discussion

The net-snmp daemon implements the "simple network management protocol". The version 3 of SNMP as implemented in net-snmp uses the length of the HMAC in a packet to verify against a local HMAC for authentication. An attacker can therefore send a SNMPv3 packet with a one byte HMAC and guess the correct first byte of the local HMAC with 256 packets (max).

Additionally a buffer overflow in perl-snmp was fixed that can cause a denial-of-service/crash.

2) Solution or Work-Around

Please install the update package.

3) Special Instructions and Notes

Please restart net-snmp after the update.

4) Package Location and Checksums

The preferred method for installing security updates is to use the YaST Online Update (YOU) tool. YOU detects which updates are required and automatically performs the necessary steps to verify and install them. Alternatively, download the update packages for your distribution manually and verify their integrity by the methods listed in Section 6 of this announcement. Then install the packages using the command

 rpm -Fhv <file.rpm>

to apply the update, replacing with the filename of the downloaded RPM package.

x86 Platform:

openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libsnmp15-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-devel-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/perl-SNMP-5.4.1-77.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/snmp-mibs-5.4.1-77.2.i586.rpm

openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libsnmp15-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-devel-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/perl-SNMP-5.4.1-19.2.i586.rpm http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/snmp-mibs-5.4.1-19.2.i586.rpm

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-5.4.rc2-8.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-devel-5.4.rc2-8.i586.rpm ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/perl-SNMP-5.4.rc2-8.i586.rpm

x86-64 Platform:

openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/net-snmp-32bit-5.4.1-77.2.x86_64.rpm

openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/net-snmp-32bit-5.4.1-19.2.x86_64.rpm

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/net-snmp-32bit-5.4.rc2-8.x86_64.rpm

Sources:

openSUSE 11.0: http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/net-snmp-5.4.1-77.2.src.rpm

openSUSE 10.3: http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/net-snmp-5.4.1-19.2.src.rpm

openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/net-snmp-5.4.rc2-8.src.rpm

Our maintenance customers are notified individually. The packages are offered for installation from the maintenance web:

Open Enterprise Server http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

Novell Linux POS 9 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

Novell Linux Desktop 9 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SUSE Linux Enterprise Server 10 SP1 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SUSE Linux Enterprise Server 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SLE SDK 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SLE SDK 10 SP1 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SUSE Linux Enterprise Desktop 10 SP1 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SUSE Linux Enterprise Desktop 10 SP2 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848

SUSE SLES 9 http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848


5) Pending Vulnerabilities, Solutions, and Work-Arounds:

  • viewvc/subversion This update of subversion fixes multiple vulnerabilities.
    • CVE-2008-1290: list CVS or SVN commits on "all-forbidden" files
    • CVE-2008-1291: directly access hidden CVSROOT folders
    • CVE-2008-1292: expose restricted content via the revision view, the log history, or the diff view

6) Authenticity Verification and Additional Information

  • Announcement authenticity verification:

    SUSE security announcements are published via mailing lists and on Web sites. The authenticity and integrity of a SUSE security announcement is guaranteed by a cryptographic signature in each announcement. All SUSE security announcements are published with a valid signature.

    To verify the signature of the announcement, save it as text into a file and run the command

    gpg --verify

    replacing with the name of the file where you saved the announcement. The output for a valid signature looks like:

    gpg: Signature made using RSA key ID 3D25D3D9 gpg: Good signature from "SuSE Security Team security@suse.de"

    where is replaced by the date the document was signed.

    If the security team's key is not contained in your key ring, you can import it from the first installation CD. To import the key, use the command

    gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc

  • Package authenticity verification:

    SUSE update packages are available on many mirror FTP servers all over the world. While this service is considered valuable and important to the free and open source software community, the authenticity and the integrity of a package needs to be verified to ensure that it has not been tampered with.

    The internal rpm package signatures provide an easy way to verify the authenticity of an RPM package. Use the command

    rpm -v --checksig

    to verify the signature of the package, replacing with the filename of the RPM package downloaded. The package is unmodified if it contains a valid signature from build@suse.de with the key ID 9C800ACA.

    This key is automatically imported into the RPM database (on RPMv4-based distributions) and the gpg key ring of 'root' during installation. You can also find it on the first installation CD and at the end of this announcement.

  • SUSE runs two security mailing lists to which any interested party may subscribe:

    opensuse-security@opensuse.org - General Linux and SUSE security discussion. All SUSE security announcements are sent to this list. To subscribe, send an e-mail to opensuse-security+subscribe@opensuse.org.

    opensuse-security-announce@opensuse.org - SUSE's announce-only mailing list. Only SUSE's security announcements are sent to this list. To subscribe, send an e-mail to opensuse-security-announce+subscribe@opensuse.org.

    ===================================================================== SUSE's security contact is security@suse.com or security@suse.de. The security@suse.de public key is listed below. =====================================================================


    The information in this advisory may be distributed or reproduced, provided that the advisory is not modified in any way. In particular, the clear text signature should show proof of the authenticity of the text.

    SUSE Linux Products GmbH provides no warranties of any kind whatsoever with respect to the information contained in this security advisory.

Type Bits/KeyID Date User ID pub 2048R/3D25D3D9 1999-03-06 SuSE Security Team security@suse.de pub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key build@suse.de

  • -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.4.2 (GNU/Linux)

mQENAzbhLQQAAAEIAKAkXHe0lWRBXLpn38hMHy03F0I4Sszmoc8aaKJrhfhyMlOA BqvklPLE2f9UrI4Xc860gH79ZREwAgPt0pi6+SleNFLNcNFAuuHMLQOOsaMFatbz JR9i4m/lf6q929YROu5zB48rBAlcfTm+IBbijaEdnqpwGib45wE/Cfy6FAttBHQh 1Kp+r/jPbf1mYAvljUfHKuvbg8t2EIQz/5yGp+n5trn9pElfQO2cRBq8LFpf1l+U P7EKjFmlOq+Gs/fF98/dP3DfniSd78LQPq5vp8RL8nr/o2i7jkAQ33m4f1wOBWd+ cZovrKXYlXiR+Bf7m2hpZo+/sAzhd7LmAD0l09kABRG0JVN1U0UgU2VjdXJpdHkg VGVhbSA8c2VjdXJpdHlAc3VzZS5kZT6JARUDBRA24S1H5Fiyh7HKPEUBAVcOB/9b yHYji1/+4Xc2GhvXK0FSJN0MGgeXgW47yxDL7gmR4mNgjlIOUHZj0PEpVjWepOJ7 tQS3L9oP6cpj1Fj/XxuLbkp5VCQ61hpt54coQAvYrnT9rtWEGN+xmwejT1WmYmDJ xG+EGBXKr+XP69oIUl1E2JO3rXeklulgjqRKos4cdXKgyjWZ7CP9V9daRXDtje63 Om8gwSdU/nCvhdRIWp/Vwbf7Ia8iZr9OJ5YuQl0DBG4qmGDDrvImgPAFkYFzwlqo choXFQ9y0YVCV41DnR+GYhwl2qBd81T8aXhihEGPIgaw3g8gd8B5o6mPVgl+nJqI BkEYGBusiag2pS6qwznZiQEVAwUQNuEtBHey5gA9JdPZAQFtOAf+KVh939b0J94u v/kpg4xs1LthlhquhbHcKNoVTNspugiC3qMPyvSX4XcBr2PC0cVkS4Z9PY9iCfT+ x9WM96g39dAF+le2CCx7XISk9XXJ4ApEy5g4AuK7NYgAJd39PPbERgWnxjxir9g0 Ix30dS30bW39D+3NPU5Ho9TD/B7UDFvYT5AWHl3MGwo3a1RhTs6sfgL7yQ3U+mvq MkTExZb5mfN1FeaYKMopoI4VpzNVeGxQWIz67VjJHVyUlF20ekOz4kWVgsxkc8G2 saqZd6yv2EwqYTi8BDAduweP33KrQc4KDDommQNDOXxaKOeCoESIdM4p7Esdjq1o L0oixF12CohGBBARAgAGBQI7HmHDAAoJEJ5A4xAACqukTlQAoI4QzP9yjPohY7OU F7J3eKBTzp25AJ42BmtSd3pvm5ldmognWF3Trhp+GYkAlQMFEDe3O8IWkDf+zvyS FQEBAfkD/3GG5UgJj18UhYmh1gfjIlDcPAeqMwSytEHDENmHC+vlZQ/p0mT9tPiW tp34io54mwr+bLPN8l6B5GJNkbGvH6M+mO7R8Lj4nHL6pyAv3PQr83WyLHcaX7It Klj371/4yzKV6qpz43SGRK4MacLo2rNZ/dNej7lwPCtzCcFYwqkiiEYEEBECAAYF AjoaQqQACgkQx1KqMrDf94ArewCfWnTUDG5gNYkmHG4bYL8fQcizyA4An2eVo/n+ 3J2KRWSOhpAMsnMxtPbBmQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCk YS3yEKeueNWc+z/0Kvff4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP +Y0PFPboMvKx0FXl/A0dM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR 8xocQSVCFxcwvwCglVcOQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U 8c/yE/vdvpN6lF0tmFrKXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0S cZqITuZC4CWxJa9GynBED3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEh ELBeGaPdNCcmfZ66rKUdG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtB UVKn4zLUOf6aeBAoV6NMCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOo AqajLfvkURHAeSsxXIoEmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1n KFvF+rQoU3VTRSBQYWNrYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohi BBMRAgAiBQJA2AY+AhsDBQkObd+9BAsHAwIDFQIDAxYCAQIeAQIXgAAKCRCoTtro nIAKypCfAJ9RuZ6ZSV7QW4pTgTIxQ+ABPp0sIwCffG9bCNnrETPlgOn+dGEkAWeg KL+IRgQQEQIABgUCOnBeUgAKCRCeQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lx yoAejACeOO1HIbActAevk5MUBhNeLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWn B/9An5vfiUUE1VQnt+T/EYklES3tXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDV wM2OgSEISZxbzdXGnqIlcT08TzBUD9i579uifklLsnr35SJDZ6ram51/CWOnnaVh UzneOA9gTPSr+/fT3WeVnwJiQCQ30kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF 5Yryk23pQUPAgJENDEqeU6iIO9Ot1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3 D3EN8C1yPqZd5CvvznYvB6bWBIpWcRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGu zgpJt9IXSzyohEJB6XG5+D0BuQINBDnu9JIQCACEkdBN6Mxf5WvqDWkcMRy6wnrd 9DYJ8UUTmIT2iQf07tRUKJJ9v0JXfx2Z4d08IQSMNRaq4VgSe+PdYgIy0fbj23Vi a5/gO7fJEpD2hd2f+pMnOWvH2rOOIbeYfuhzAc6BQjAKtmgR0ERUTafTM9Wb6F13 CNZZNZfDqnFDP6L12w3z3F7FFXkz07Rs3AIto1ZfYZd4sCSpMr/0S5nLrHbIvGLp 271hhQBeRmmoGEKO2JRelGgUJ2CUzOdtwDIKT0LbCpvaP8PVnYF5IFoYJIWRHqlE t5ucTXstZy7vYjL6vTP4l5xs+LIOkNmPhqmfsgLzVo0UaLt80hOwc4NvDCOLAAMG B/9g+9V3ORzw4LvO1pwRYJqfDKUq/EJ0rNMMD4N8RLpZRhKHKJUm9nNHLbksnlZw rbSTM5LpC/U6sheLP+l0bLVoq0lmsCcUSyh+mY6PxWirLIWCn/IAZAGnXb6Zd6Tt IJlGG6pqUN8QxGJYQnonl0uTJKHJENbI9sWHQdcTtBMc34gorHFCo1Bcvpnc1LFL rWn7mfoGx6INQjf3HGQpMXAWuSBQhzkazY6vaWFpa8bBJ+gKbBuySWzNm3rFtT5H RKMWpO+M9bHp4d+puY0L1YwN1OMatcMMpcWnZpiWiR83oi32+xtWUY2U7Ae38mMa g8zFbpeqPQUsDv9V7CAJ1dbriEwEGBECAAwFAkDYBnoFCQ5t3+gACgkQqE7a6JyA CspnpgCfRbYwxT3iq+9l/PgNTUNTZOlof2oAn25y0eGi0371jap9kOV6uq71sUuO =ypVs - -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux)

iQEVAwUBSJL0gHey5gA9JdPZAQI4IAf7BPqInfbAyzZObcX2vGZM0svDKclNQMAO 1tTE0O3Te0EYLOnkfEisqNe9AOioSUQqeWu7ud5Y8L5zVysmcGe3/Lg0Vqmie/he WJXCJtkvaPOcp7p/GcnWQByQ4T1cQ4+QoLhwg2+RpyAABn/7ZWBz+uG91134kOql JabvxLI05Le++uwFfJ0YEefkSzik9sMVz4Dk4eVJglMm6nioHnx6K6ZrR0+0HBRR z2Rczq0M3gYplfWpgydgtlFH4dhkXlhfuladf93Aagf6QWerwvxTEld7ti+Sx3dU uInx4nkLJHLeu1f/XD4i7ZpZ0DtBz0F9wWJFGmy2cXxW0Xnhtwdbnw== =QwLq -----END PGP SIGNATURE-----


Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-685-1 December 03, 2008 net-snmp vulnerabilities CVE-2008-0960, CVE-2008-2292, CVE-2008-4309 ===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10

This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the following package versions:

Ubuntu 6.06 LTS: libsnmp-perl 5.2.1.2-4ubuntu2.3 libsnmp9 5.2.1.2-4ubuntu2.3

Ubuntu 7.10: libsnmp-perl 5.3.1-6ubuntu2.2 libsnmp10 5.3.1-6ubuntu2.2

Ubuntu 8.04 LTS: libsnmp-perl 5.4.1~dfsg-4ubuntu4.2 libsnmp15 5.4.1~dfsg-4ubuntu4.2

Ubuntu 8.10: libsnmp15 5.4.1~dfsg-7.1ubuntu6.1

In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Wes Hardaker discovered that the SNMP service did not correctly validate HMAC authentication requests. An unauthenticated remote attacker could send specially crafted SNMPv3 traffic with a valid username and gain access to the user's views without a valid authentication passphrase. (CVE-2008-0960)

John Kortink discovered that the Net-SNMP Perl module did not correctly check the size of returned values. If a user or automated system were tricked into querying a malicious SNMP server, the application using the Perl module could be made to crash, leading to a denial of service. This did not affect Ubuntu 8.10. (CVE-2008-2292)

It was discovered that the SNMP service did not correctly handle large GETBULK requests. If an unauthenticated remote attacker sent a specially crafted request, the SNMP service could be made to crash, leading to a denial of service. (CVE-2008-4309)

Updated packages for Ubuntu 6.06 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz
  Size/MD5:    75402 9655d984a47cec8e27efa4db0b227870
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc
  Size/MD5:      838 17a17230a005c1acfd0569757e728fad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz
  Size/MD5:  3869893 34159770a7fe418d99fdd416a75358b1

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb
  Size/MD5:  1152306 f7647cee4df8db87ab48c0d05635a973
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb
  Size/MD5:   822946 b9b852c188937d1fffc06d4da01325d5

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb
  Size/MD5:   896620 a78012b3f0f13667081f97dc1a4d62e8
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb
  Size/MD5:  1497194 7d55b8d1e4ae0c45753bedcf536a1a5a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb
  Size/MD5:  1826252 0550c1401f9bbe5f345fd96484ed369c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb
  Size/MD5:   889330 5ad0ddb2c610973166e4dd07769ba3d3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb
  Size/MD5:   797086 18cf4210342b683d3ee24fe995329b55

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb
  Size/MD5:   896880 298d27ea1ece6e80bb8931b9a5e61961
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb
  Size/MD5:  1268472 acbca43ab7ea747fa3e4636d15ef997c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb
  Size/MD5:  1710342 bd27290685bcf1d6a23eb8705d3367e7
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb
  Size/MD5:   881838 58121bd9e4c845da7df4e540645e0e13
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb
  Size/MD5:   794672 221d1c554bd89f50dc3ac9108a6cef6b

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb
  Size/MD5:   913064 45a033b01c4b31ef90a92988bb5fb229
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb
  Size/MD5:  1590124 b62aa5477d9307d311c811298b7ec3d9
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb
  Size/MD5:  1728094 5214ce9aebe3a8d7a28a1746a81ce8ea
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb
  Size/MD5:   898580 86e6c1b5dfb5bf91f63d7c6786b7abae
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb
  Size/MD5:   796092 1bab28407224f782b2c3ae04b4647333

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb
  Size/MD5:   896832 3d233db9682d5654fdad6bc6b5a649ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb
  Size/MD5:  1485268 064304ead0ca4653136376e8e9039e74
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb
  Size/MD5:  1706490 cb76027eb8167e0866a81b93a4da28ed
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb
  Size/MD5:   883182 d1ffc12427d92be51efdba3349e74f9a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb
  Size/MD5:   796374 0f3f749ebe4af6111fe49316639004e4

Updated packages for Ubuntu 7.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz
  Size/MD5:    94646 8b6f9380d9f8c5514a1d4db729c6df04
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc
  Size/MD5:     1287 f53866efd3ae4f3c939a77b1005e1f11
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz
  Size/MD5:  4210843 360a9783dbc853bab6bda90d961daee5

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb
  Size/MD5:   484306 f2d03276d1cdcef7e8b276ad8ca9595d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb
  Size/MD5:   901284 6889b371d4de92eb61bf83b89d8a8c37

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb
  Size/MD5:  2541692 1e6de4bd3c3baa444a2e1980a593a40e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb
  Size/MD5:   968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb
  Size/MD5:  1200930 821861c24499cfdfa2a82c329c610c16
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb
  Size/MD5:   996572 00cc1a4c8c7924124984e666563e73d0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb
  Size/MD5:   908792 a40763280a3bdbe60eca5e07c5d6c30c

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb
  Size/MD5:  2321524 59d44616802197e1227cf88abddefe36
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb
  Size/MD5:   967106 a6e5b308d889bdf6f5abe454e35ba474
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb
  Size/MD5:  1124462 ec99daa26d0fafba6e9f0b874a23bf3d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb
  Size/MD5:   991956 cb20b6a4d68a858ffa0846431169d411
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb
  Size/MD5:   907546 1ab5119e23a16e99203c113d49fc2723

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb
  Size/MD5:  2305548 da57690a3327196e0c3684735be23f2e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb
  Size/MD5:   968984 8da336a5fd871be10e6b8d66d3b9c9d3
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb
  Size/MD5:  1074500 e4d6690a6a6a543fc0244a29cd350c9b
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb
  Size/MD5:   989566 2d2f4b1662e6a2dffafe8e98f00a15e7
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb
  Size/MD5:   907596 4274e006754ebc836132166e0f0429a0

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb
  Size/MD5:  2641202 9b2ec56463ee715752b780aa332d8cd0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb
  Size/MD5:   985722 a2fca8426b7b51e98c39b91a468bf71f
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb
  Size/MD5:  1154496 6073239f7ffead2a5b9c3357ada1602c
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb
  Size/MD5:  1018596 af12cc55597a0d2d3a92b4b5d683bb14
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb
  Size/MD5:   911866 57e2246930e712bdc1b039840d43af48

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb
  Size/MD5:  2527568 19b1a0971259a9b99f9c0386f5935bfc
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb
  Size/MD5:   970264 d8ae7f0bb10375ad487b14ba031cd013
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb
  Size/MD5:  1078842 2401fc4c40352b8c8013e8c5de3b0ecd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb
  Size/MD5:   995228 16b230d3c718d8eb4a023126bd09d7f5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb
  Size/MD5:   908708 1e410a8ddac41ad9faec901c5a638f29

Updated packages for Ubuntu 8.04 LTS:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz
  Size/MD5:    78642 b4acf50e47be498e579b934f32081d25
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc
  Size/MD5:     1447 0abcea5df87851df2aae7ebd1fc00e7a
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
  Size/MD5:  4618308 0ef987c41d3414f2048c94d187a2baeb

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb
  Size/MD5:   526864 f3a131bf5a4f5c547573430cb66d410c
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb
  Size/MD5:   102072 2f276f50efdb7e34f7e61f132f7f7cd7

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb
  Size/MD5:  1796950 283c5a95206ab74062e0e30eba4e0890
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb
  Size/MD5:   142522 9fff294368a7eac39e37fa478ac6609d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb
  Size/MD5:  1296694 d0646a1543c51f14a93b40f972bc1569
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb
  Size/MD5:   163178 0378a25e3b2a0bc80ddb8ec720b5557d
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb
  Size/MD5:    75960 fcba461f2e2376cad515329791e04a17
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb
  Size/MD5:    38512 21d9ecbc86a8e5965047d027e94fd324

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb
  Size/MD5:  1556806 39e4f63b841c4b36c022017d66c12f58
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb
  Size/MD5:   179478 5f08596ae997792920e238ff8cd2a7ba
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb
  Size/MD5:  1098794 38bc61a5b403fb4f626a641a5f13e681
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb
  Size/MD5:   157954 66e38c37639f3c68e7e4a933fa953ff3
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb
  Size/MD5:    74116 50b3a4d0cfd38585d2711d30cf725e9d
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb
  Size/MD5:    75038 98cdeec4b1014568b00107a82fc74418

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb
  Size/MD5:  1552018 d9dcab084f3b9bf3e8c36cb5db8f141e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb
  Size/MD5:   141508 96061180809cccc975e0d7079e07ed3e
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb
  Size/MD5:  1171530 2d91048fe0a2ac9e3a4fddb84c67513e
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb
  Size/MD5:   155564 c67ba3aeb2535ee3e7fc4c89e90ba36a
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb
  Size/MD5:    74274 db05202893f516398bbe4e2153ef2d6e
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb
  Size/MD5:    35552 a75caf212ffb5a0eafe4ba2656c9aae1

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
  Size/MD5:  1874428 0ed8b5f4e6bad74d506d73447de00bd2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
  Size/MD5:   158374 dfcd7c4455b4bbd3f746368058d09a59
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
  Size/MD5:  1238226 b5b3a81e956cdb14674d571694d1b6d0
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
  Size/MD5:   185314 5e9d8bd56493f75ae8a8691c530aa420
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
  Size/MD5:    83106 75dea32ec7152b7868fabf09d9d5a198
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb
  Size/MD5:    42928 214fe703fced2e387b48b51dcbb1d6b7

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb
  Size/MD5:  1760062 ade4c08289d947d092a5b2ab06517cc7
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb
  Size/MD5:   143860 62b7260d618531b0ed5e7871ab7b99a9
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb
  Size/MD5:  1159702 28ea81660bbdd9d7982be58d225e8814
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb
  Size/MD5:   160236 196e493ce73905446a3764e73b99f332
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb
  Size/MD5:    75518 f24e4b0e3e4a7d97c28da99cdc0a47a5
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb
  Size/MD5:    38240 873f5e820e381ec2254ed520bcd09af0

Updated packages for Ubuntu 8.10:

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz
  Size/MD5:    82260 85fb58aa81933f142bd937bca2e18341
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc
  Size/MD5:     1956 1ee06f6b731eae435af6a2d438ef909b
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz
  Size/MD5:  4618308 0ef987c41d3414f2048c94d187a2baeb

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb
  Size/MD5:   527650 9c56f3d70018b714895a61c0daba9498
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb
  Size/MD5:   103060 108eb50387ca46b4ee38ebb8722ced88

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
  Size/MD5:  1815638 82385081fe2d4eeb1a6c94f9dae672ad
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
  Size/MD5:   146154 1b6249e02e89213f2f4d2aa9c9123420
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
  Size/MD5:  1315628 8443e091f2c63485a422236ad23e55cd
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
  Size/MD5:   165522 154a05824b98e041ceac60ac83709ef4
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
  Size/MD5:    77914 8d6e328f309e78bf1fcf21c2633d82ec
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb
  Size/MD5:    39930 6b7a1a67ca63b5c843ce66f3547b3c89

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
  Size/MD5:  1569568 dd0599b150eccee9889325d17a7b0769
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
  Size/MD5:   184264 52a54aebef81648164a5bc90f27b0cc5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
  Size/MD5:  1119072 10c81fe283b25e7ad31fcfd88a2325f0
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
  Size/MD5:   156112 6296f0836bc9797ff48810c79965c3a5
http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
  Size/MD5:    74476 bd96a6915eb97fed083aac4daa5f07cf
http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb
  Size/MD5:    77652 3e30e51c362dfa982a3b3197be081328

lpia architecture (Low Power Intel Architecture):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
  Size/MD5:  1557614 065f4575c7a2d257fa6b5b9d0cee454f
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
  Size/MD5:   144292 b55f2c4aff8a86499d7f38fd6e773f44
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
  Size/MD5:  1184272 84116fefdce279ce338ffc9614384c06
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
  Size/MD5:   154444 ffe9e765a01695355bdb58008a2910f5
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
  Size/MD5:    73746 762e75672fbd395d2d159513f5d572b0
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb
  Size/MD5:    36530 0a98b51b94a5f75d4131d657aa766579

powerpc architecture (Apple Macintosh G3/G4/G5):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
  Size/MD5:  1884632 a3ad023841ee605efa1e055712b44d9a
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
  Size/MD5:   161074 5586adea8200d2d5bf81f288b5bf7be2
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
  Size/MD5:  1249636 48ec688499fea1dc0ccb3091c0158fb8
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
  Size/MD5:   181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
  Size/MD5:    81802 965218126fb5a49cfcd9e20afeb49782
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb
  Size/MD5:    43048 09f2f9ed9f519ca5723411802e46d48b

sparc architecture (Sun SPARC/UltraSPARC):

http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
  Size/MD5:  1759316 46455cc355c1b808243eada0f134d00b
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
  Size/MD5:   145164 2cdb5b35db853c7c184a44022fc23cd8
http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
  Size/MD5:  1159834 cfff424e5bff38bb3ef9419f03465388
http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
  Size/MD5:   163042 354f7a5423a34c411c5f8620c66d3e58
http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
  Size/MD5:    76994 ca11bcf9a411f618e35e1d6b6ab8c8f9
http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb
  Size/MD5:    38526 172493ec5df1866e2633e074c7f38775

.


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292


Updated Packages:

Mandriva Linux 2007.1: 8db66ef5a5468d3fd72a47855230a28e 2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm c951b17138ef11828b2ccf031d4cddaf 2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm 536a87919f32fac81964d0a907bf08fe 2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm 39e33947c21666dac5dbe5cfe103b26d 2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm 1eed5ebaff8f6f83befbf8d831900073 2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm 874db03c69584025e4d91049072d3c4e 2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm 11af93c879d8cd9353b7cb1826900222 2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm 2c9e819eeb5fd472f6a0fe338d86182b 2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64: aa27de502ce22110fd745c0b847b79d9 2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm 1843dd154c443cca9ae977e502221d6d 2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm 838bd7820d446bd947bc46e090b38066 2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm e659d3df04816330c7bf45008f66bc27 2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm 756d5606a1039d20a7512b0a109d53bb 2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm 8ad36943e07362865f3a48c99914e48c 2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm 483140c06017507127d12357c3ed2b41 2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm e2bb901815ffa1ca5b0a16bc1363f84f 2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm 7a0806202ff8f3d838fa7958b636a449 2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm

Mandriva Linux 2008.0: 8de3c4975620db2b2c2697d6f9deb79b 2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm b1991c58d996f4be200fe141e28c5f7d 2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm 03c54182cc7f97633f29ff0251a8c898 2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm 1f792de19b7b38b56d68242958d5d800 2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm e3362a641e232a6ecf0b8230f0e49ec8 2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm bc6d8c10135ea64a4d512d80d04b1b39 2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm 8e7f28ee85fb48129eea57d11d391c8b 2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm beab129e378f61a6bf62d366a4d90639 2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64: 82b570c9cb7e0662df4d7da730c131db 2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm 20b8a6e3fc8dd82fe5ecfdb337553938 2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 555688caa0eee850b3a5f835a5778849 2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm 60d65f80aec29dcb6d4ceb4bb117a9bc 2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm 685c9dd25b585afc128de1b3c092e5d5 2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm 7bff860904572c092f737ac17940d5b2 2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm e434686bddfb04f2a8bd01346517ecb4 2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm 4fab6e498e1f05809db500ce895aad66 2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm 3fce488df784163f19e6a55061d773ca 2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm

Mandriva Linux 2008.1: 4bafceae1a29f6557b5aa884eca24ba0 2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm 1eedbae5df7e503de1cba736129beaa1 2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm 615a88847cbf1ce6eaf0029037a14b1b 2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm 7323cb7d35eb67664d40ad73b413679d 2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm d43ed96a806639a94af2a137c75e276e 2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm 7394b1361b43056b5eb99827771358cf 2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm 8d6fd9308c2edbe8c020d2c33b3a841d 2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm dc58047a02e1a222af20aa794ea8f447 2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm 2ad9888cd61fc4952c1cee0c48f714b5 2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm

Mandriva Linux 2008.1/X86_64: 618c241e0ecb57685646264c9bb083b4 2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm bb0ebf49ee7cca29965aeb398f4725f6 2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm b4f29f00773291f6cc00784ed7cde470 2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm 3039811b6682dc4009b32ff48a99eb2b 2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm fab09178635501eb5d6a82eb7bd532a3 2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm da29d4c7edaa15d95f8bee98dbfab025 2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm d9aad834d82d310c64f6f21e17a55920 2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm 7a7c871bd87dc91c16b046ac115cda70 2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm d102ea2af0fcaaebd98defda72bcfc91 2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm 7a19c1f8d42052af6392b18b48bd965c 2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm

Corporate 3.0: 335af3930865c8eb44ef436cad5fb373 corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm b8e1d307ee6fa3905d292077fc063318 corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm a668cc4de411865567d1a93f34cee1e3 corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm d8c0d342b03e5719443d2de06c631bd5 corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm 6bbe3bb2502ce3c974f7b5737331bb4d corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm daca10f2e578f75c1e7415d78ed30265 corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm 1630ebd75201e1bc3956b12a26282f92 corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm 5a4f483c877a6278088a265cb3273d61 corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm 316d866de7fa7cd984d58f5cb742f5e3 corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm e3d4197517565f12e2c3a8fd1cc5d2e7 corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm 17e8d856fd1dac18552818a842105c88 corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm

Corporate 3.0/X86_64: b31f277942fca76d953007c94a60cae2 corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm e4a3fba10ccdd805dc8783ae68c99a42 corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm 530a94cc87af0e4d6e9f3815473c0dd4 corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm f246ca421b5d16c599d53f70e4b97660 corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm b943e07726a2fecb016ef4ba626906d8 corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm 22822876f72e35cf6d1ed027df93e74a corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm e7e51782b9bbd1e1bdf93c17fb953280 corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm e67a9105f9492c020693d48ce55652ea corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm 171a17e507b2dfdb9c70c0089e582221 corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm 96886146d21175b076e92d59e96f5016 corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm 1b6ee4c253f15be516a1928a4f791f15 corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm ccaa4d311ad0e5d119e17b1f1876c7e2 corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm 53e16d2069cffb7e7d1e7a324192d5c2 corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm

Corporate 4.0: 6cbe9d76db3b05c2435bcbc5cf16c898 corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm 586a55cfde45020d5ea0ebf5f2d6c840 corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm d992d8300cf0639942a179349d592e15 corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm 03a49b848c376b705dcfcef0ec817daf corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm 22b9d01b3b7a8a34ed3e1a5a435286a8 corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm dccc01a94c1f29eac2875e6a935bf589 corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm 77f93230f96abce039b52ca5612eaa36 corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm 8a7209b70979c9d73035ff40cbd8dbb4 corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64: f94c7e967973ba8aa12b5605251d6e78 corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm f332985986eff2d6c8a75b5c263dedb1 corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 82fc454916e75866370ee738292021c8 corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ff0adeb23df57eb34869c7100df159da corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 72f2dc9cb1695999660a9ff9c97e4c47 corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 0f244551c87e051a8274e5050cf0bc2a corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 7c4e7fb304c77c6551a50495d338e84e corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm 68d81ca4c173710ef43b36092df2a6ee corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm ac919459a8752cddfd441c085ca69117 corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm

Multi Network Firewall 2.0: f98286a301d580fe306917cf0169ef88 mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm 3ba27516773b1dd933828207cecc7754 mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200806-0575",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios xr",
            scope: null,
            trust: 1.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "session and resource control",
            scope: "eq",
            trust: 1,
            vendor: "juniper",
            version: "1.0",
         },
         {
            model: "src pe",
            scope: "eq",
            trust: 1,
            vendor: "juniper",
            version: "1.0",
         },
         {
            model: "session and resource control",
            scope: "eq",
            trust: 1,
            vendor: "juniper",
            version: "2.0",
         },
         {
            model: "src pe",
            scope: "eq",
            trust: 1,
            vendor: "juniper",
            version: "2.0",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "extreme",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "global associates",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "internet initiative",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "juniper",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "network appliance",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "snmp research",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ecoscentric",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netsnmp",
            version: null,
         },
         {
            model: "net-snmp",
            scope: "lt",
            trust: 0.8,
            vendor: "net snmp",
            version: "5.2.4.1",
         },
         {
            model: "net-snmp",
            scope: "lt",
            trust: 0.8,
            vendor: "net snmp",
            version: "5.3.2.1",
         },
         {
            model: "net-snmp",
            scope: "lt",
            trust: 0.8,
            vendor: "net snmp",
            version: "5.4.1.1",
         },
         {
            model: "mac os x",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.5.4",
         },
         {
            model: "mac os x server",
            scope: "lt",
            trust: 0.8,
            vendor: "apple",
            version: "10.5.4",
         },
         {
            model: "centrecom",
            scope: "eq",
            trust: 0.8,
            vendor: "allied telesis",
            version: "9424t/sp",
         },
         {
            model: "centrecom",
            scope: "eq",
            trust: 0.8,
            vendor: "allied telesis",
            version: "9424t/sp-e",
         },
         {
            model: "centrecom",
            scope: "eq",
            trust: 0.8,
            vendor: "allied telesis",
            version: "9424ts/xp-e",
         },
         {
            model: "switchblade 5400s series",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "switchblade 7800r series",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "switchblade 7800s series",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "switchblade x908",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "x900-12xt/s",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "x900-24xs",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "x900-24xt",
            scope: null,
            trust: 0.8,
            vendor: "allied telesis",
            version: null,
         },
         {
            model: "ax2400s series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax3600s series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax5400s series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax6300s series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax6700s series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax7700r series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax7800r series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "ax7800s series",
            scope: null,
            trust: 0.8,
            vendor: "alaxala",
            version: null,
         },
         {
            model: "seil/neu",
            scope: "eq",
            trust: 0.8,
            vendor: "internet initiative",
            version: "128 2.00 to  2.42",
         },
         {
            model: "seil/plus",
            scope: "eq",
            trust: 0.8,
            vendor: "internet initiative",
            version: "1.00 to  1.91",
         },
         {
            model: "seil/turbo",
            scope: "eq",
            trust: 0.8,
            vendor: "internet initiative",
            version: "1.00 to  1.91",
         },
         {
            model: "seil/x1,x2",
            scope: "eq",
            trust: 0.8,
            vendor: "internet initiative",
            version: "1.00 to  1.20",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.0",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.1",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "3 (x86)",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "3 (x86-64)",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "3.0",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "3.0 (x86-64)",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "4.0",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "4.0 (x86-64)",
         },
         {
            model: "opensolaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "(sparc)",
         },
         {
            model: "opensolaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "(x86)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "10 (sparc)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "10 (x86)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "8.x",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.4",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (as)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (es)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (ws)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 (as)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 (es)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3 (ws)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "4 (as)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "4 (es)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "4 (ws)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "5 (server)",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "3.0",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "4.0",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "5.0 (client)",
         },
         {
            model: "linux advanced workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1",
         },
         {
            model: "rhel desktop workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "5 (client)",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "r400 series (ax7800r series",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "ax7700r series )",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "s2400 series (ax2400s series )",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "s3600 series (ax3600s series )",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "s400 series (ax7800s series )",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "s6300 series (ax6300s series )",
         },
         {
            model: "ip8800/s,/r",
            scope: "eq",
            trust: 0.8,
            vendor: "nec",
            version: "s6700 series (ax6700s series )",
         },
         {
            model: "gr4000",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "gs3000",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "gs4000",
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: "ipcom series",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.6,
            vendor: "sun",
            version: "10.0",
         },
         {
            model: "esx server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.0.3",
         },
         {
            model: "esx server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.0.2",
         },
         {
            model: "esx server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.0.1",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.58",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.56",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.54",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.52",
         },
         {
            model: "esx server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.5",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.45",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.43",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.419",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.417",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.416",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.415",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.413",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.410",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.41",
         },
         {
            model: "esx server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.4",
         },
         {
            model: "esx server",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "3.5",
         },
         {
            model: "esx server patch",
            scope: "eq",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.55",
         },
         {
            model: "ucd-snmp",
            scope: "eq",
            trust: 0.3,
            vendor: "ucd snmp",
            version: "4.2.6",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.10",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.10",
         },
         {
            model: "linux lpia",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.10",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.10",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.10",
         },
         {
            model: "linux lts sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.04",
         },
         {
            model: "linux lts powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.04",
         },
         {
            model: "linux lts lpia",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.04",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.04",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "8.04",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "7.10",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "7.10",
         },
         {
            model: "linux lpia",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "7.10",
         },
         {
            model: "linux i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "7.10",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "7.10",
         },
         {
            model: "linux lts sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "6.06",
         },
         {
            model: "linux lts powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "6.06",
         },
         {
            model: "linux lts i386",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "6.06",
         },
         {
            model: "linux lts amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "ubuntu",
            version: "6.06",
         },
         {
            model: "linux enterprise server",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "9",
         },
         {
            model: "linux enterprise server sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "linux enterprise server sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "linux enterprise sdk 10.sp1",
            scope: null,
            trust: 0.3,
            vendor: "suse",
            version: null,
         },
         {
            model: "linux enterprise sdk sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "linux enterprise desktop sp2",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "linux enterprise desktop sp1",
            scope: "eq",
            trust: 0.3,
            vendor: "suse",
            version: "10",
         },
         {
            model: "solaris 10 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "solaris 10 sparc",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris build snv 01",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "opensolaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "12.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "slackware",
            version: "12.0",
         },
         {
            model: "linux -current",
            scope: null,
            trust: 0.3,
            vendor: "slackware",
            version: null,
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "11.0",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "10.3",
         },
         {
            model: "opensuse",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "10.2",
         },
         {
            model: "open-enterprise-server",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "0",
         },
         {
            model: "novell linux pos",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "9",
         },
         {
            model: "novell linux desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "s u s e",
            version: "9.0",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "7",
         },
         {
            model: "enterprise linux ws",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "enterprise linux ws",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux es",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux es",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "enterprise linux desktop workstation client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "enterprise linux desktop client",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "enterprise linux as",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux as",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3",
         },
         {
            model: "enterprise linux desktop version",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "5",
         },
         {
            model: "desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "4.0",
         },
         {
            model: "desktop",
            scope: "eq",
            trust: 0.3,
            vendor: "redhat",
            version: "3.0",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "6600",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "6400",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "6000",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5700",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5600",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5400",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5300",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5100",
         },
         {
            model: "networks switched firewall series",
            scope: "eq",
            trust: 0.3,
            vendor: "nortel",
            version: "5000",
         },
         {
            model: "net-snmp",
            scope: "eq",
            trust: 0.3,
            vendor: "net snmp",
            version: "5.4.1",
         },
         {
            model: "net-snmp",
            scope: "eq",
            trust: 0.3,
            vendor: "net snmp",
            version: "5.3.2",
         },
         {
            model: "net-snmp",
            scope: "eq",
            trust: 0.3,
            vendor: "net snmp",
            version: "5.2.4",
         },
         {
            model: "linux mandrake x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "2008.1",
         },
         {
            model: "linux mandrake",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "2008.1",
         },
         {
            model: "linux mandrake x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "2008.0",
         },
         {
            model: "linux mandrake",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "2008.0",
         },
         {
            model: "linux mandrake x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "2007.1",
         },
         {
            model: "linux mandrake",
            scope: "eq",
            trust: 0.3,
            vendor: "mandriva",
            version: "2007.1",
         },
         {
            model: "multi network firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "2.0",
         },
         {
            model: "corporate server x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "4.0",
         },
         {
            model: "corporate server x86 64",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "3.0",
         },
         {
            model: "corporate server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "3.0",
         },
         {
            model: "corporate server",
            scope: "eq",
            trust: 0.3,
            vendor: "mandrakesoft",
            version: "4.0",
         },
         {
            model: "session and resource control appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "2.0",
         },
         {
            model: "session and resource control appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.0.1",
         },
         {
            model: "session and resource control appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "juniper",
            version: "1.0",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.6.4",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.6.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.6",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.5.2",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.5.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.4.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.4",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.3",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.2",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.2.3",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.2.2",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.2.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.3.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.2.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.2",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.1",
         },
         {
            model: "siparator",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.4",
         },
         {
            model: "firewalll",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.4",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.6.4",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.6.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.6",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.5.2",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.5.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.4.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.4",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.3",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.2",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.3",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.2.3",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.2.2",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.2.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "4.1.3",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.3.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.2.1",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.2",
         },
         {
            model: "firewall",
            scope: "eq",
            trust: 0.3,
            vendor: "ingate",
            version: "3.1",
         },
         {
            model: "openview snmp emanate master agent",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "15",
         },
         {
            model: "linux",
            scope: null,
            trust: 0.3,
            vendor: "gentoo",
            version: null,
         },
         {
            model: "ecos",
            scope: "eq",
            trust: 0.3,
            vendor: "ecoscentric",
            version: "0",
         },
         {
            model: "linux sparc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux s/390",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux powerpc",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux mipsel",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux mips",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux m68k",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux ia-64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux ia-32",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux hppa",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux arm",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux amd64",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux alpha",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "debian",
            version: "4.0",
         },
         {
            model: "wireless lan controller module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "wireless lan control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "wireless lan control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0",
         },
         {
            model: "wireless lan control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1",
         },
         {
            model: "wireless lan control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "wireless lan control",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.19",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.18",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.17",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.13",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.9",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.7",
         },
         {
            model: "wide area application services",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "nx-os",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "mds",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "9000",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "catos",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "application control engine module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5.11",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5.7",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.3.3",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2.7",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2.3.9",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2.1.7",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1.15",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1.13.7",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1.11.6",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1.9",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0.17.6",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0.5",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0.3",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0.1",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2.11",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2.9",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2.7",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1.3",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1.1",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0.3",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2.0",
         },
         {
            model: "application & content networking software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "application & content networking software",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ace xml gateway",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "ace appliance",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "messaging storage server mm3.0",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "messaging storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.0",
         },
         {
            model: "messaging storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1",
         },
         {
            model: "messaging storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "messaging storage server",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.0",
         },
         {
            model: "messaging storage server",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "message networking mn",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1",
         },
         {
            model: "message networking",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1",
         },
         {
            model: "message networking",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "intuity audix r5",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "0",
         },
         {
            model: "intuity audix lx",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "intuity audix",
            scope: null,
            trust: 0.3,
            vendor: "avaya",
            version: null,
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "interactive response",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "2.0",
         },
         {
            model: "emmc",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.021",
         },
         {
            model: "emmc",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "1.017",
         },
         {
            model: "communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.0",
         },
         {
            model: "communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1",
         },
         {
            model: "communication manager",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.0",
         },
         {
            model: "aura sip enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1.1",
         },
         {
            model: "aura sip enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "5.0",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "3.1.5",
         },
         {
            model: "aura application enablement services",
            scope: "eq",
            trust: 0.3,
            vendor: "avaya",
            version: "4.2",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.2",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.1",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.4.11",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.4.11",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5",
         },
         {
            model: "esx server patch",
            scope: "ne",
            trust: 0.3,
            vendor: "vmware",
            version: "2.5.510",
         },
         {
            model: "net-snmp",
            scope: "ne",
            trust: 0.3,
            vendor: "net snmp",
            version: "5.4.1.1",
         },
         {
            model: "net-snmp",
            scope: "ne",
            trust: 0.3,
            vendor: "net snmp",
            version: "5.3.2.1",
         },
         {
            model: "net-snmp",
            scope: "ne",
            trust: 0.3,
            vendor: "net snmp",
            version: "5.2.4.1",
         },
         {
            model: "siparator",
            scope: "ne",
            trust: 0.3,
            vendor: "ingate",
            version: "4.7.1",
         },
         {
            model: "firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "ingate",
            version: "4.7.1",
         },
         {
            model: "mac os server",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.4",
         },
         {
            model: "mac os",
            scope: "ne",
            trust: 0.3,
            vendor: "apple",
            version: "x10.5.4",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            db: "BID",
            id: "29623",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Wes Hardaker",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2008-0960",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2008-0960",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "VHN-31085",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2008-0960",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#878044",
                  trust: 0.8,
                  value: "7.56",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200806-140",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-31085",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2008-0960",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. SNMPv3 The implementation of contains an authentication bypass vulnerability because it does not properly handle crafted packets. SNMP (Simple Network Management Protocol) Is a widely used protocol for monitoring and managing network devices. SNMPv3 Supports security features such as authentication and privacy control. SNMPv3 In the authentication of HMAC (keyed-Hash Message Authentication Code) Is used. This code is generated by combining a private key and a cryptographic hash function. SNMPv3 Depending on the implementation of, there is a possibility that authentication may be bypassed by processing specially crafted packets due to vulnerability in authentication processing.By remote third party SNMP The object may be read or modified. Net-SNMP is prone to a remote authentication-bypass vulnerability caused by a design error. \nSuccessfully exploiting this issue will allow attackers to gain unauthorized access to the affected application. \nNet-SNMP 5.4.1, 5.3.2, 5.2.4, and prior versions are vulnerable. The software is used to monitor network equipment, computer equipment, UPS equipment, etc. Vulnerabilities exist in Net-SNMP's handling of authentication. Net-SNMP's authentication code depends on the length of the HMAC length specified in the user input to read the length to be checked. If the user provides a single-byte HMAC code in the authentication code field, only the first byte will be checked, so there will be a 1/256 probability of matching the correct HMAC and Through authentication, this greatly improves the success rate of brute force guessing. An attacker could exploit this vulnerability to read and modify any SNMP object accessible using the authenticated credentials logged into the system. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\n                   VMware Security Advisory\n\nAdvisory ID:       VMSA-2008-0017\nSynopsis:          Updated ESX packages for libxml2, ucd-snmp, libtiff\nIssue date:        2008-10-31\nUpdated on:        2008-10-31 (initial release of advisory)\nCVE numbers:       CVE-2008-3281 CVE-2008-0960 CVE-2008-2327\n- ------------------------------------------------------------------------\n\n1. Summary\n\n   Updated ESX packages for libxml2, ucd-snmp, libtiff. \n\n2. Relevant releases\n\n   ESX 3.0.3 without patch ESX303-200810503-SG\n   ESX 3.0.2 without patch ESX-1006968\n   ESX 2.5.5 before Upgrade Patch 10\n   ESX 2.5.4 before Upgrade Patch 21\n\n   NOTE: Extended support (Security and Bug fixes) for ESX 3.0.2 ended\n         on 2008-10-29. Extended support (Security and Bug fixes) for\n         ESX 2.5.4 ended on 2008-10-08. \n\n         Extended support for ESX 3.0.2 Update 1 ends on 2009-08-08. Users\n         should plan to upgrade to ESX 3.0.3 and preferably to the newest\n         release available. \n\n3. Problem Description\n\n a. Updated ESX Service Console package libxml2\n\n    A denial of service flaw was found in the way libxml2 processes\n    certain content. If an application that is linked against\n    libxml2 processes malformed XML content, the XML content might\n    cause the application to stop responding. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2008-3281 to this issue. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    VirtualCenter  any       Windows  not affected\n\n    hosted         any       any      not affected\n\n    ESXi           3.5       ESXi     not affected\n\n    ESX            3.5       ESX      affected, patch pending\n    ESX            3.0.3     ESX      ESX303-200810503-SG\n    ESX            3.0.2     ESX      ESX-1006968\n    ESX            2.5.5     ESX      ESX 2.5.5 upgrade patch 10 or later\n    ESX            2.5.4     ESX      ESX 2.5.4 upgrade patch 21\n\n    * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n b. Updated ESX Service Console package ucd-snmp\n\n    A flaw was found in the way ucd-snmp checks an SNMPv3 packet's\n    Keyed-Hash Message Authentication Code. An attacker could use\n    this flaw to spoof an authenticated SNMPv3 packet. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2008-0960 to this issue. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    VirtualCenter  any       Windows  not affected\n\n    hosted         any       any      not affected\n\n    ESXi           3.5       ESXi     not affected\n\n    ESX            3.5       ESX      not affected\n    ESX            3.0.3     ESX      not affected\n    ESX            3.0.2     ESX      not affected\n    ESX            2.5.5     ESX      ESX 2.5.5 upgrade patch 10 or later\n    ESX            2.5.4     ESX      ESX 2.5.4 upgrade patch 21\n\n    * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n c. Updated third party library libtiff\n\n    Multiple uses of uninitialized values were discovered in libtiff's\n    Lempel-Ziv-Welch (LZW) compression algorithm decoder. An attacker\n    could create a carefully crafted LZW-encoded TIFF file that would\n    cause an application linked with libtiff to crash or, possibly,\n    execute arbitrary code. \n\n    The Common Vulnerabilities and Exposures project (cve.mitre.org)\n    has assigned the name CVE-2008-2327 to this issue. \n\n    The following table lists what action remediates the vulnerability\n    (column 4) if a solution is available. \n\n    VMware         Product   Running  Replace with/\n    Product        Version   on       Apply Patch\n    =============  ========  =======  =================\n    VirtualCenter  any       Windows  not affected\n\n    hosted         any       any      not affected\n\n    ESXi           3.5       ESXi     not affected\n\n    ESX            3.5       ESX      not affected\n    ESX            3.0.3     ESX      not affected\n    ESX            3.0.2     ESX      not affected\n    ESX            2.5.5     ESX      ESX 2.5.5 upgrade patch 10 or later\n    ESX            2.5.4     ESX      ESX 2.5.4 upgrade patch 21\n\n    * hosted products are VMware Workstation, Player, ACE, Server, Fusion. \n\n4. Solution\n\n   Please review the patch/release notes for your product and version\n   and verify the md5sum of your downloaded file. \n\n   ESX\n   ---\n   ESX 3.0.3 patch ESX303-200810503-SG\n   http://download3.vmware.com/software/vi/ESX303-200810503-SG.zip\n   md5sum: e687313e58377be41f6e6b767dfbf268\n   http://kb.vmware.com/kb/1006971\n\n   ESX 3.0.2 patch ESX-1006968\n   http://download3.vmware.com/software/vi/ESX-1006968.tgz\n   md5sum: fc9e30cff6f03a209e6a275254fa6719\n   http://kb.vmware.com/kb/1006968\n\n   VMware ESX 2.5.5 Upgrade Patch 10\n   http://download3.vmware.com/software/esx/esx-2.5.5-119702-upgrade.tar.gz\n   md5sum: 2ee87cdd70b1ba84751e24c0bd8b4621\n   http://vmware.com/support/esx25/doc/esx-255-200810-patch.html\n\n   VMware ESX 2.5.4 Upgrade Patch 21\n   http://download3.vmware.com/software/esx/esx-2.5.4-119703-upgrade.tar.gz\n   md5sum: d791be525c604c852a03dd7df0eabf35\n   http://vmware.com/support/esx25/doc/esx-254-200810-patch.html\n\n5. References\n\n   CVE numbers\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3281\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327\n\n- ------------------------------------------------------------------------\n6. Change log\n\n2008-10-31  VMSA-2008-0017\nInitial security advisory after release of ESX 3.0.3, ESX 3.0.2, ESX\n2.5.5 and ESX 2.5.4 patches on 2008-10-30. \n\n- -----------------------------------------------------------------------\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n  * security-announce at lists.vmware.com\n  * bugtraq at securityfocus.com\n  * full-disclosure at lists.grok.org.uk\n\nE-mail:  security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Center\nhttp://www.vmware.com/security\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2008 VMware Inc.  All rights reserved. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 200808-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n  Severity: Normal\n     Title: Net-SNMP: Multiple vulnerabilities\n      Date: August 06, 2008\n      Bugs: #222265, #225105\n        ID: 200808-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities in Net-SNMP allow for authentication bypass in\nsnmpd and execution of arbitrary code in Perl applications using\nNet-SMNP. \n\nBackground\n==========\n\nNet-SNMP is a collection of tools for generating and retrieving SNMP\ndata. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package                /  Vulnerable  /                Unaffected\n    -------------------------------------------------------------------\n  1  net-analyzer/net-snmp      < 5.4.1.1                   >= 5.4.1.1\n\nDescription\n===========\n\nWes Hardaker reported that the SNMPv3 HMAC verification relies on the\nclient to specify the HMAC length (CVE-2008-0960). John Kortink\nreported a buffer overflow in the Perl bindings of Net-SNMP when\nprocessing the OCTETSTRING in an attribute value pair (AVP) received by\nan SNMP agent (CVE-2008-2292). \n\nImpact\n======\n\nAn attacker could send SNMPv3 packets to an instance of snmpd providing\na valid user name and an HMAC length value of 1, and easily conduct\nbrute-force attacks to bypass SNMP authentication. An attacker could\nfurther entice a user to connect to a malicious SNMP agent with an SNMP\nclient using the Perl bindings, possibly resulting in the execution of\narbitrary code. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Net-SNMP users should upgrade to the latest version:\n\n    # emerge --sync\n    # emerge --ask --oneshot --verbose \">=net-analyzer/net-snmp-5.4.1.1\"\n\nReferences\n==========\n\n  [ 1 ] CVE-2008-0960\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n  [ 2 ] CVE-2008-2292\n        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n  http://security.gentoo.org/glsa/glsa-200808-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n______________________________________________________________________________\n\n                        SUSE Security Announcement\n\n        Package:                net-snmp\n        Announcement ID:        SUSE-SA:2008:039\n        Date:                   Fri, 01 Aug 2008 13:00:00 +0000\n        Affected Products:      openSUSE 10.2\n                                openSUSE 10.3\n                                openSUSE 11.0\n                                SUSE SLES 9\n                                Novell Linux Desktop 9\n                                Open Enterprise Server\n                                Novell Linux POS 9\n                                SUSE Linux Enterprise Desktop 10 SP1\n                                SLE SDK 10 SP1\n                                SLE SDK 10 SP2\n                                SUSE Linux Enterprise Server 10 SP1\n                                SUSE Linux Enterprise Desktop 10 SP2\n                                SUSE Linux Enterprise Server 10 SP2\n        Vulnerability Type:     authentication bypass, denial-of-service\n        Severity (1-10):        6\n        SUSE Default Package:   no\n        Cross-References:       CVE-2008-0960\n                                CVE-2008-2292\n\n    Content of This Advisory:\n        1) Security Vulnerability Resolved:\n            - authentication bypass\n            - denial-of-service\n           Problem Description\n        2) Solution or Work-Around\n        3) Special Instructions and Notes\n        4) Package Location and Checksums\n        5) Pending Vulnerabilities, Solutions, and Work-Arounds:\n            - viewvc/subversion\n        6) Authenticity Verification and Additional Information\n\n______________________________________________________________________________\n\n1) Problem Description and Brief Discussion\n\n   The net-snmp daemon implements the \"simple network management protocol\". \n   The version 3 of SNMP as implemented in net-snmp uses the length of the\n   HMAC in a packet to verify against a local HMAC for authentication. \n   An attacker can therefore send a SNMPv3 packet with a one byte HMAC and\n   guess the correct first byte of the local HMAC with 256 packets (max). \n\n   Additionally a buffer overflow in perl-snmp was fixed that can cause a\n   denial-of-service/crash. \n\n2) Solution or Work-Around\n\n   Please install the update package. \n\n3) Special Instructions and Notes\n\n   Please restart net-snmp after the update. \n\n4) Package Location and Checksums\n\n   The preferred method for installing security updates is to use the YaST\n   Online Update (YOU) tool. YOU detects which updates are required and\n   automatically performs the necessary steps to verify and install them. \n   Alternatively, download the update packages for your distribution manually\n   and verify their integrity by the methods listed in Section 6 of this\n   announcement. Then install the packages using the command\n\n     rpm -Fhv <file.rpm>\n\n   to apply the update, replacing <file.rpm> with the filename of the\n   downloaded RPM package. \n\n   \n   x86 Platform:\n   \n   openSUSE 11.0:\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libsnmp15-5.4.1-77.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-5.4.1-77.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-devel-5.4.1-77.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/perl-SNMP-5.4.1-77.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/snmp-mibs-5.4.1-77.2.i586.rpm\n   \n   openSUSE 10.3:\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libsnmp15-5.4.1-19.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-5.4.1-19.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-devel-5.4.1-19.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/perl-SNMP-5.4.1-19.2.i586.rpm\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/snmp-mibs-5.4.1-19.2.i586.rpm\n   \n   openSUSE 10.2:\n   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-5.4.rc2-8.i586.rpm\n   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/net-snmp-devel-5.4.rc2-8.i586.rpm\n   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/perl-SNMP-5.4.rc2-8.i586.rpm\n   \n   x86-64 Platform:\n   \n   openSUSE 11.0:\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/net-snmp-32bit-5.4.1-77.2.x86_64.rpm\n   \n   openSUSE 10.3:\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/net-snmp-32bit-5.4.1-19.2.x86_64.rpm\n   \n   openSUSE 10.2:\n   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/net-snmp-32bit-5.4.rc2-8.x86_64.rpm\n   \n   Sources:\n   \n   openSUSE 11.0:\n   http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/net-snmp-5.4.1-77.2.src.rpm\n   \n   openSUSE 10.3:\n   http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/net-snmp-5.4.1-19.2.src.rpm\n   \n   openSUSE 10.2:\n   ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/net-snmp-5.4.rc2-8.src.rpm\n   \n   Our maintenance customers are notified individually. The packages are\n   offered for installation from the maintenance web:\n   \n   Open Enterprise Server\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   Novell Linux POS 9\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   Novell Linux Desktop 9\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SUSE Linux Enterprise Server 10 SP1\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SUSE Linux Enterprise Server 10 SP2\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SLE SDK 10 SP2\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SLE SDK 10 SP1\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SUSE Linux Enterprise Desktop 10 SP1\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SUSE Linux Enterprise Desktop 10 SP2\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n   \n   SUSE SLES 9\n     http://download.novell.com/index.jsp?search=Search&keywords=71093bdfd49361f6dbe32a8fde43b848\n\n______________________________________________________________________________\n\n5) Pending Vulnerabilities, Solutions, and Work-Arounds:\n\n   - viewvc/subversion\n     This update of subversion fixes multiple vulnerabilities. \n     - CVE-2008-1290: list CVS or SVN commits on \"all-forbidden\" files\n     - CVE-2008-1291: directly access hidden CVSROOT folders\n     - CVE-2008-1292: expose restricted content via the revision view,\n                      the log history, or the diff view\n\n______________________________________________________________________________\n\n6) Authenticity Verification and Additional Information\n\n  - Announcement authenticity verification:\n\n    SUSE security announcements are published via mailing lists and on Web\n    sites. The authenticity and integrity of a SUSE security announcement is\n    guaranteed by a cryptographic signature in each announcement. All SUSE\n    security announcements are published with a valid signature. \n\n    To verify the signature of the announcement, save it as text into a file\n    and run the command\n\n      gpg --verify <file>\n\n    replacing <file> with the name of the file where you saved the\n    announcement. The output for a valid signature looks like:\n\n      gpg: Signature made <DATE> using RSA key ID 3D25D3D9\n      gpg: Good signature from \"SuSE Security Team <security@suse.de>\"\n\n    where <DATE> is replaced by the date the document was signed. \n\n    If the security team's key is not contained in your key ring, you can\n    import it from the first installation CD. To import the key, use the\n    command\n\n      gpg --import gpg-pubkey-3d25d3d9-36e12d04.asc\n\n  - Package authenticity verification:\n\n    SUSE update packages are available on many mirror FTP servers all over the\n    world. While this service is considered valuable and important to the free\n    and open source software community, the authenticity and the integrity of\n    a package needs to be verified to ensure that it has not been tampered\n    with. \n\n    The internal rpm package signatures provide an easy way to verify the\n    authenticity of an RPM package. Use the command\n\n     rpm -v --checksig <file.rpm>\n\n    to verify the signature of the package, replacing <file.rpm> with the\n    filename of the RPM package downloaded. The package is unmodified if it\n    contains a valid signature from build@suse.de with the key ID 9C800ACA. \n\n    This key is automatically imported into the RPM database (on\n    RPMv4-based distributions) and the gpg key ring of 'root' during\n    installation. You can also find it on the first installation CD and at\n    the end of this announcement. \n\n  - SUSE runs two security mailing lists to which any interested party may\n    subscribe:\n\n    opensuse-security@opensuse.org\n        -   General Linux and SUSE security discussion. \n            All SUSE security announcements are sent to this list. \n            To subscribe, send an e-mail to\n                <opensuse-security+subscribe@opensuse.org>. \n\n    opensuse-security-announce@opensuse.org\n        -   SUSE's announce-only mailing list. \n            Only SUSE's security announcements are sent to this list. \n            To subscribe, send an e-mail to\n                <opensuse-security-announce+subscribe@opensuse.org>. \n\n    =====================================================================\n    SUSE's security contact is <security@suse.com> or <security@suse.de>. \n    The <security@suse.de> public key is listed below. \n    =====================================================================\n______________________________________________________________________________\n\n    The information in this advisory may be distributed or reproduced,\n    provided that the advisory is not modified in any way. In particular, the\n    clear text signature should show proof of the authenticity of the text. \n\n    SUSE Linux Products GmbH provides no warranties of any kind whatsoever\n    with respect to the information contained in this security advisory. \n\nType Bits/KeyID     Date       User ID\npub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de>\npub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de>\n\n- -----BEGIN PGP PUBLIC KEY BLOCK-----\nVersion: GnuPG v1.4.2 (GNU/Linux)\n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\n=ypVs\n- -----END PGP PUBLIC KEY BLOCK-----\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.5 (GNU/Linux)\n\niQEVAwUBSJL0gHey5gA9JdPZAQI4IAf7BPqInfbAyzZObcX2vGZM0svDKclNQMAO\n1tTE0O3Te0EYLOnkfEisqNe9AOioSUQqeWu7ud5Y8L5zVysmcGe3/Lg0Vqmie/he\nWJXCJtkvaPOcp7p/GcnWQByQ4T1cQ4+QoLhwg2+RpyAABn/7ZWBz+uG91134kOql\nJabvxLI05Le++uwFfJ0YEefkSzik9sMVz4Dk4eVJglMm6nioHnx6K6ZrR0+0HBRR\nz2Rczq0M3gYplfWpgydgtlFH4dhkXlhfuladf93Aagf6QWerwvxTEld7ti+Sx3dU\nuInx4nkLJHLeu1f/XD4i7ZpZ0DtBz0F9wWJFGmy2cXxW0Xnhtwdbnw==\n=QwLq\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ===========================================================\nUbuntu Security Notice USN-685-1          December 03, 2008\nnet-snmp vulnerabilities\nCVE-2008-0960, CVE-2008-2292, CVE-2008-4309\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 7.10\nUbuntu 8.04 LTS\nUbuntu 8.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n  libsnmp-perl                    5.2.1.2-4ubuntu2.3\n  libsnmp9                        5.2.1.2-4ubuntu2.3\n\nUbuntu 7.10:\n  libsnmp-perl                    5.3.1-6ubuntu2.2\n  libsnmp10                       5.3.1-6ubuntu2.2\n\nUbuntu 8.04 LTS:\n  libsnmp-perl                    5.4.1~dfsg-4ubuntu4.2\n  libsnmp15                       5.4.1~dfsg-4ubuntu4.2\n\nUbuntu 8.10:\n  libsnmp15                       5.4.1~dfsg-7.1ubuntu6.1\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nWes Hardaker discovered that the SNMP service did not correctly validate\nHMAC authentication requests.  An unauthenticated remote attacker\ncould send specially crafted SNMPv3 traffic with a valid username\nand gain access to the user's views without a valid authentication\npassphrase. (CVE-2008-0960)\n\nJohn Kortink discovered that the Net-SNMP Perl module did not correctly\ncheck the size of returned values.  If a user or automated system were\ntricked into querying a malicious SNMP server, the application using\nthe Perl module could be made to crash, leading to a denial of service. \nThis did not affect Ubuntu 8.10. (CVE-2008-2292)\n\nIt was discovered that the SNMP service did not correctly handle large\nGETBULK requests.  If an unauthenticated remote attacker sent a specially\ncrafted request, the SNMP service could be made to crash, leading to a\ndenial of service. (CVE-2008-4309)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz\n      Size/MD5:    75402 9655d984a47cec8e27efa4db0b227870\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc\n      Size/MD5:      838 17a17230a005c1acfd0569757e728fad\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz\n      Size/MD5:  3869893 34159770a7fe418d99fdd416a75358b1\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb\n      Size/MD5:  1152306 f7647cee4df8db87ab48c0d05635a973\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb\n      Size/MD5:   822946 b9b852c188937d1fffc06d4da01325d5\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb\n      Size/MD5:   896620 a78012b3f0f13667081f97dc1a4d62e8\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb\n      Size/MD5:  1497194 7d55b8d1e4ae0c45753bedcf536a1a5a\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb\n      Size/MD5:  1826252 0550c1401f9bbe5f345fd96484ed369c\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb\n      Size/MD5:   889330 5ad0ddb2c610973166e4dd07769ba3d3\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb\n      Size/MD5:   797086 18cf4210342b683d3ee24fe995329b55\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb\n      Size/MD5:   896880 298d27ea1ece6e80bb8931b9a5e61961\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb\n      Size/MD5:  1268472 acbca43ab7ea747fa3e4636d15ef997c\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb\n      Size/MD5:  1710342 bd27290685bcf1d6a23eb8705d3367e7\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb\n      Size/MD5:   881838 58121bd9e4c845da7df4e540645e0e13\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb\n      Size/MD5:   794672 221d1c554bd89f50dc3ac9108a6cef6b\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb\n      Size/MD5:   913064 45a033b01c4b31ef90a92988bb5fb229\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb\n      Size/MD5:  1590124 b62aa5477d9307d311c811298b7ec3d9\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb\n      Size/MD5:  1728094 5214ce9aebe3a8d7a28a1746a81ce8ea\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb\n      Size/MD5:   898580 86e6c1b5dfb5bf91f63d7c6786b7abae\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb\n      Size/MD5:   796092 1bab28407224f782b2c3ae04b4647333\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb\n      Size/MD5:   896832 3d233db9682d5654fdad6bc6b5a649ba\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb\n      Size/MD5:  1485268 064304ead0ca4653136376e8e9039e74\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb\n      Size/MD5:  1706490 cb76027eb8167e0866a81b93a4da28ed\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb\n      Size/MD5:   883182 d1ffc12427d92be51efdba3349e74f9a\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb\n      Size/MD5:   796374 0f3f749ebe4af6111fe49316639004e4\n\nUpdated packages for Ubuntu 7.10:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz\n      Size/MD5:    94646 8b6f9380d9f8c5514a1d4db729c6df04\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc\n      Size/MD5:     1287 f53866efd3ae4f3c939a77b1005e1f11\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz\n      Size/MD5:  4210843 360a9783dbc853bab6bda90d961daee5\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb\n      Size/MD5:   484306 f2d03276d1cdcef7e8b276ad8ca9595d\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb\n      Size/MD5:   901284 6889b371d4de92eb61bf83b89d8a8c37\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb\n      Size/MD5:  2541692 1e6de4bd3c3baa444a2e1980a593a40e\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb\n      Size/MD5:   968940 7efe4bdcb99f311f1c4bb2c3b9d24a4e\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb\n      Size/MD5:  1200930 821861c24499cfdfa2a82c329c610c16\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb\n      Size/MD5:   996572 00cc1a4c8c7924124984e666563e73d0\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb\n      Size/MD5:   908792 a40763280a3bdbe60eca5e07c5d6c30c\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb\n      Size/MD5:  2321524 59d44616802197e1227cf88abddefe36\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb\n      Size/MD5:   967106 a6e5b308d889bdf6f5abe454e35ba474\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb\n      Size/MD5:  1124462 ec99daa26d0fafba6e9f0b874a23bf3d\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb\n      Size/MD5:   991956 cb20b6a4d68a858ffa0846431169d411\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb\n      Size/MD5:   907546 1ab5119e23a16e99203c113d49fc2723\n\n  lpia architecture (Low Power Intel Architecture):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb\n      Size/MD5:  2305548 da57690a3327196e0c3684735be23f2e\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb\n      Size/MD5:   968984 8da336a5fd871be10e6b8d66d3b9c9d3\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb\n      Size/MD5:  1074500 e4d6690a6a6a543fc0244a29cd350c9b\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb\n      Size/MD5:   989566 2d2f4b1662e6a2dffafe8e98f00a15e7\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb\n      Size/MD5:   907596 4274e006754ebc836132166e0f0429a0\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb\n      Size/MD5:  2641202 9b2ec56463ee715752b780aa332d8cd0\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb\n      Size/MD5:   985722 a2fca8426b7b51e98c39b91a468bf71f\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb\n      Size/MD5:  1154496 6073239f7ffead2a5b9c3357ada1602c\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb\n      Size/MD5:  1018596 af12cc55597a0d2d3a92b4b5d683bb14\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb\n      Size/MD5:   911866 57e2246930e712bdc1b039840d43af48\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb\n      Size/MD5:  2527568 19b1a0971259a9b99f9c0386f5935bfc\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb\n      Size/MD5:   970264 d8ae7f0bb10375ad487b14ba031cd013\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb\n      Size/MD5:  1078842 2401fc4c40352b8c8013e8c5de3b0ecd\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb\n      Size/MD5:   995228 16b230d3c718d8eb4a023126bd09d7f5\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb\n      Size/MD5:   908708 1e410a8ddac41ad9faec901c5a638f29\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz\n      Size/MD5:    78642 b4acf50e47be498e579b934f32081d25\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc\n      Size/MD5:     1447 0abcea5df87851df2aae7ebd1fc00e7a\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n      Size/MD5:  4618308 0ef987c41d3414f2048c94d187a2baeb\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb\n      Size/MD5:   526864 f3a131bf5a4f5c547573430cb66d410c\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb\n      Size/MD5:   102072 2f276f50efdb7e34f7e61f132f7f7cd7\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n      Size/MD5:  1796950 283c5a95206ab74062e0e30eba4e0890\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n      Size/MD5:   142522 9fff294368a7eac39e37fa478ac6609d\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n      Size/MD5:  1296694 d0646a1543c51f14a93b40f972bc1569\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n      Size/MD5:   163178 0378a25e3b2a0bc80ddb8ec720b5557d\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n      Size/MD5:    75960 fcba461f2e2376cad515329791e04a17\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb\n      Size/MD5:    38512 21d9ecbc86a8e5965047d027e94fd324\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb\n      Size/MD5:  1556806 39e4f63b841c4b36c022017d66c12f58\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb\n      Size/MD5:   179478 5f08596ae997792920e238ff8cd2a7ba\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb\n      Size/MD5:  1098794 38bc61a5b403fb4f626a641a5f13e681\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb\n      Size/MD5:   157954 66e38c37639f3c68e7e4a933fa953ff3\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb\n      Size/MD5:    74116 50b3a4d0cfd38585d2711d30cf725e9d\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb\n      Size/MD5:    75038 98cdeec4b1014568b00107a82fc74418\n\n  lpia architecture (Low Power Intel Architecture):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n      Size/MD5:  1552018 d9dcab084f3b9bf3e8c36cb5db8f141e\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n      Size/MD5:   141508 96061180809cccc975e0d7079e07ed3e\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n      Size/MD5:  1171530 2d91048fe0a2ac9e3a4fddb84c67513e\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n      Size/MD5:   155564 c67ba3aeb2535ee3e7fc4c89e90ba36a\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n      Size/MD5:    74274 db05202893f516398bbe4e2153ef2d6e\n    http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb\n      Size/MD5:    35552 a75caf212ffb5a0eafe4ba2656c9aae1\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n      Size/MD5:  1874428 0ed8b5f4e6bad74d506d73447de00bd2\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n      Size/MD5:   158374 dfcd7c4455b4bbd3f746368058d09a59\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n      Size/MD5:  1238226 b5b3a81e956cdb14674d571694d1b6d0\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n      Size/MD5:   185314 5e9d8bd56493f75ae8a8691c530aa420\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n      Size/MD5:    83106 75dea32ec7152b7868fabf09d9d5a198\n    http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb\n      Size/MD5:    42928 214fe703fced2e387b48b51dcbb1d6b7\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n      Size/MD5:  1760062 ade4c08289d947d092a5b2ab06517cc7\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n      Size/MD5:   143860 62b7260d618531b0ed5e7871ab7b99a9\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n      Size/MD5:  1159702 28ea81660bbdd9d7982be58d225e8814\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n      Size/MD5:   160236 196e493ce73905446a3764e73b99f332\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n      Size/MD5:    75518 f24e4b0e3e4a7d97c28da99cdc0a47a5\n    http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb\n      Size/MD5:    38240 873f5e820e381ec2254ed520bcd09af0\n\nUpdated packages for Ubuntu 8.10:\n\n  Source archives:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz\n      Size/MD5:    82260 85fb58aa81933f142bd937bca2e18341\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc\n      Size/MD5:     1956 1ee06f6b731eae435af6a2d438ef909b\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz\n      Size/MD5:  4618308 0ef987c41d3414f2048c94d187a2baeb\n\n  Architecture independent packages:\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n      Size/MD5:   527650 9c56f3d70018b714895a61c0daba9498\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb\n      Size/MD5:   103060 108eb50387ca46b4ee38ebb8722ced88\n\n  amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n      Size/MD5:  1815638 82385081fe2d4eeb1a6c94f9dae672ad\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n      Size/MD5:   146154 1b6249e02e89213f2f4d2aa9c9123420\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n      Size/MD5:  1315628 8443e091f2c63485a422236ad23e55cd\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n      Size/MD5:   165522 154a05824b98e041ceac60ac83709ef4\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n      Size/MD5:    77914 8d6e328f309e78bf1fcf21c2633d82ec\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb\n      Size/MD5:    39930 6b7a1a67ca63b5c843ce66f3547b3c89\n\n  i386 architecture (x86 compatible Intel/AMD):\n\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n      Size/MD5:  1569568 dd0599b150eccee9889325d17a7b0769\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n      Size/MD5:   184264 52a54aebef81648164a5bc90f27b0cc5\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n      Size/MD5:  1119072 10c81fe283b25e7ad31fcfd88a2325f0\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n      Size/MD5:   156112 6296f0836bc9797ff48810c79965c3a5\n    http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n      Size/MD5:    74476 bd96a6915eb97fed083aac4daa5f07cf\n    http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb\n      Size/MD5:    77652 3e30e51c362dfa982a3b3197be081328\n\n  lpia architecture (Low Power Intel Architecture):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n      Size/MD5:  1557614 065f4575c7a2d257fa6b5b9d0cee454f\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n      Size/MD5:   144292 b55f2c4aff8a86499d7f38fd6e773f44\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n      Size/MD5:  1184272 84116fefdce279ce338ffc9614384c06\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n      Size/MD5:   154444 ffe9e765a01695355bdb58008a2910f5\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n      Size/MD5:    73746 762e75672fbd395d2d159513f5d572b0\n    http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb\n      Size/MD5:    36530 0a98b51b94a5f75d4131d657aa766579\n\n  powerpc architecture (Apple Macintosh G3/G4/G5):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n      Size/MD5:  1884632 a3ad023841ee605efa1e055712b44d9a\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n      Size/MD5:   161074 5586adea8200d2d5bf81f288b5bf7be2\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n      Size/MD5:  1249636 48ec688499fea1dc0ccb3091c0158fb8\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n      Size/MD5:   181952 8ef5f6b9b6c6b8e4fcd5cb37147304a2\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n      Size/MD5:    81802 965218126fb5a49cfcd9e20afeb49782\n    http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb\n      Size/MD5:    43048 09f2f9ed9f519ca5723411802e46d48b\n\n  sparc architecture (Sun SPARC/UltraSPARC):\n\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n      Size/MD5:  1759316 46455cc355c1b808243eada0f134d00b\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n      Size/MD5:   145164 2cdb5b35db853c7c184a44022fc23cd8\n    http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n      Size/MD5:  1159834 cfff424e5bff38bb3ef9419f03465388\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n      Size/MD5:   163042 354f7a5423a34c411c5f8620c66d3e58\n    http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n      Size/MD5:    76994 ca11bcf9a411f618e35e1d6b6ab8c8f9\n    http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb\n      Size/MD5:    38526 172493ec5df1866e2633e074c7f38775\n\n. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 8db66ef5a5468d3fd72a47855230a28e  2007.1/i586/libnet-snmp10-5.3.1-3.2mdv2007.1.i586.rpm\n c951b17138ef11828b2ccf031d4cddaf  2007.1/i586/libnet-snmp10-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 536a87919f32fac81964d0a907bf08fe  2007.1/i586/libnet-snmp10-static-devel-5.3.1-3.2mdv2007.1.i586.rpm\n 39e33947c21666dac5dbe5cfe103b26d  2007.1/i586/net-snmp-5.3.1-3.2mdv2007.1.i586.rpm\n 1eed5ebaff8f6f83befbf8d831900073  2007.1/i586/net-snmp-mibs-5.3.1-3.2mdv2007.1.i586.rpm\n 874db03c69584025e4d91049072d3c4e  2007.1/i586/net-snmp-trapd-5.3.1-3.2mdv2007.1.i586.rpm\n 11af93c879d8cd9353b7cb1826900222  2007.1/i586/net-snmp-utils-5.3.1-3.2mdv2007.1.i586.rpm\n 2c9e819eeb5fd472f6a0fe338d86182b  2007.1/i586/perl-NetSNMP-5.3.1-3.2mdv2007.1.i586.rpm \n 7a0806202ff8f3d838fa7958b636a449  2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n aa27de502ce22110fd745c0b847b79d9  2007.1/x86_64/lib64net-snmp10-5.3.1-3.2mdv2007.1.x86_64.rpm\n 1843dd154c443cca9ae977e502221d6d  2007.1/x86_64/lib64net-snmp10-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n 838bd7820d446bd947bc46e090b38066  2007.1/x86_64/lib64net-snmp10-static-devel-5.3.1-3.2mdv2007.1.x86_64.rpm\n e659d3df04816330c7bf45008f66bc27  2007.1/x86_64/net-snmp-5.3.1-3.2mdv2007.1.x86_64.rpm\n 756d5606a1039d20a7512b0a109d53bb  2007.1/x86_64/net-snmp-mibs-5.3.1-3.2mdv2007.1.x86_64.rpm\n 8ad36943e07362865f3a48c99914e48c  2007.1/x86_64/net-snmp-trapd-5.3.1-3.2mdv2007.1.x86_64.rpm\n 483140c06017507127d12357c3ed2b41  2007.1/x86_64/net-snmp-utils-5.3.1-3.2mdv2007.1.x86_64.rpm\n e2bb901815ffa1ca5b0a16bc1363f84f  2007.1/x86_64/perl-NetSNMP-5.3.1-3.2mdv2007.1.x86_64.rpm \n 7a0806202ff8f3d838fa7958b636a449  2007.1/SRPMS/net-snmp-5.3.1-3.2mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 8de3c4975620db2b2c2697d6f9deb79b  2008.0/i586/libnet-snmp15-5.4.1-1.1mdv2008.0.i586.rpm\n b1991c58d996f4be200fe141e28c5f7d  2008.0/i586/libnet-snmp-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 03c54182cc7f97633f29ff0251a8c898  2008.0/i586/libnet-snmp-static-devel-5.4.1-1.1mdv2008.0.i586.rpm\n 1f792de19b7b38b56d68242958d5d800  2008.0/i586/net-snmp-5.4.1-1.1mdv2008.0.i586.rpm\n e3362a641e232a6ecf0b8230f0e49ec8  2008.0/i586/net-snmp-mibs-5.4.1-1.1mdv2008.0.i586.rpm\n bc6d8c10135ea64a4d512d80d04b1b39  2008.0/i586/net-snmp-trapd-5.4.1-1.1mdv2008.0.i586.rpm\n 8e7f28ee85fb48129eea57d11d391c8b  2008.0/i586/net-snmp-utils-5.4.1-1.1mdv2008.0.i586.rpm\n beab129e378f61a6bf62d366a4d90639  2008.0/i586/perl-NetSNMP-5.4.1-1.1mdv2008.0.i586.rpm \n 3fce488df784163f19e6a55061d773ca  2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 82b570c9cb7e0662df4d7da730c131db  2008.0/x86_64/lib64net-snmp15-5.4.1-1.1mdv2008.0.x86_64.rpm\n 20b8a6e3fc8dd82fe5ecfdb337553938  2008.0/x86_64/lib64net-snmp-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 555688caa0eee850b3a5f835a5778849  2008.0/x86_64/lib64net-snmp-static-devel-5.4.1-1.1mdv2008.0.x86_64.rpm\n 60d65f80aec29dcb6d4ceb4bb117a9bc  2008.0/x86_64/net-snmp-5.4.1-1.1mdv2008.0.x86_64.rpm\n 685c9dd25b585afc128de1b3c092e5d5  2008.0/x86_64/net-snmp-mibs-5.4.1-1.1mdv2008.0.x86_64.rpm\n 7bff860904572c092f737ac17940d5b2  2008.0/x86_64/net-snmp-trapd-5.4.1-1.1mdv2008.0.x86_64.rpm\n e434686bddfb04f2a8bd01346517ecb4  2008.0/x86_64/net-snmp-utils-5.4.1-1.1mdv2008.0.x86_64.rpm\n 4fab6e498e1f05809db500ce895aad66  2008.0/x86_64/perl-NetSNMP-5.4.1-1.1mdv2008.0.x86_64.rpm \n 3fce488df784163f19e6a55061d773ca  2008.0/SRPMS/net-snmp-5.4.1-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.1:\n 4bafceae1a29f6557b5aa884eca24ba0  2008.1/i586/libnet-snmp15-5.4.1-5.1mdv2008.1.i586.rpm\n 1eedbae5df7e503de1cba736129beaa1  2008.1/i586/libnet-snmp-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 615a88847cbf1ce6eaf0029037a14b1b  2008.1/i586/libnet-snmp-static-devel-5.4.1-5.1mdv2008.1.i586.rpm\n 7323cb7d35eb67664d40ad73b413679d  2008.1/i586/net-snmp-5.4.1-5.1mdv2008.1.i586.rpm\n d43ed96a806639a94af2a137c75e276e  2008.1/i586/net-snmp-mibs-5.4.1-5.1mdv2008.1.i586.rpm\n 7394b1361b43056b5eb99827771358cf  2008.1/i586/net-snmp-tkmib-5.4.1-5.1mdv2008.1.i586.rpm\n 8d6fd9308c2edbe8c020d2c33b3a841d  2008.1/i586/net-snmp-trapd-5.4.1-5.1mdv2008.1.i586.rpm\n dc58047a02e1a222af20aa794ea8f447  2008.1/i586/net-snmp-utils-5.4.1-5.1mdv2008.1.i586.rpm\n 2ad9888cd61fc4952c1cee0c48f714b5  2008.1/i586/perl-NetSNMP-5.4.1-5.1mdv2008.1.i586.rpm \n 7a19c1f8d42052af6392b18b48bd965c  2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Mandriva Linux 2008.1/X86_64:\n 618c241e0ecb57685646264c9bb083b4  2008.1/x86_64/lib64net-snmp15-5.4.1-5.1mdv2008.1.x86_64.rpm\n bb0ebf49ee7cca29965aeb398f4725f6  2008.1/x86_64/lib64net-snmp-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n b4f29f00773291f6cc00784ed7cde470  2008.1/x86_64/lib64net-snmp-static-devel-5.4.1-5.1mdv2008.1.x86_64.rpm\n 3039811b6682dc4009b32ff48a99eb2b  2008.1/x86_64/net-snmp-5.4.1-5.1mdv2008.1.x86_64.rpm\n fab09178635501eb5d6a82eb7bd532a3  2008.1/x86_64/net-snmp-mibs-5.4.1-5.1mdv2008.1.x86_64.rpm\n da29d4c7edaa15d95f8bee98dbfab025  2008.1/x86_64/net-snmp-tkmib-5.4.1-5.1mdv2008.1.x86_64.rpm\n d9aad834d82d310c64f6f21e17a55920  2008.1/x86_64/net-snmp-trapd-5.4.1-5.1mdv2008.1.x86_64.rpm\n 7a7c871bd87dc91c16b046ac115cda70  2008.1/x86_64/net-snmp-utils-5.4.1-5.1mdv2008.1.x86_64.rpm\n d102ea2af0fcaaebd98defda72bcfc91  2008.1/x86_64/perl-NetSNMP-5.4.1-5.1mdv2008.1.x86_64.rpm \n 7a19c1f8d42052af6392b18b48bd965c  2008.1/SRPMS/net-snmp-5.4.1-5.1mdv2008.1.src.rpm\n\n Corporate 3.0:\n 335af3930865c8eb44ef436cad5fb373  corporate/3.0/i586/libnet-snmp5-5.1-7.4.C30mdk.i586.rpm\n b8e1d307ee6fa3905d292077fc063318  corporate/3.0/i586/libnet-snmp5-devel-5.1-7.4.C30mdk.i586.rpm\n a668cc4de411865567d1a93f34cee1e3  corporate/3.0/i586/libnet-snmp5-static-devel-5.1-7.4.C30mdk.i586.rpm\n d8c0d342b03e5719443d2de06c631bd5  corporate/3.0/i586/libsnmp0-4.2.3-8.2.C30mdk.i586.rpm\n 6bbe3bb2502ce3c974f7b5737331bb4d  corporate/3.0/i586/libsnmp0-devel-4.2.3-8.2.C30mdk.i586.rpm\n daca10f2e578f75c1e7415d78ed30265  corporate/3.0/i586/net-snmp-5.1-7.4.C30mdk.i586.rpm\n 1630ebd75201e1bc3956b12a26282f92  corporate/3.0/i586/net-snmp-mibs-5.1-7.4.C30mdk.i586.rpm\n 5a4f483c877a6278088a265cb3273d61  corporate/3.0/i586/net-snmp-trapd-5.1-7.4.C30mdk.i586.rpm\n 316d866de7fa7cd984d58f5cb742f5e3  corporate/3.0/i586/net-snmp-utils-5.1-7.4.C30mdk.i586.rpm\n e3d4197517565f12e2c3a8fd1cc5d2e7  corporate/3.0/i586/ucd-snmp-4.2.3-8.2.C30mdk.i586.rpm\n 17e8d856fd1dac18552818a842105c88  corporate/3.0/i586/ucd-snmp-utils-4.2.3-8.2.C30mdk.i586.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2  corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2  corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n b31f277942fca76d953007c94a60cae2  corporate/3.0/x86_64/lib64net-snmp5-5.1-7.4.C30mdk.x86_64.rpm\n e4a3fba10ccdd805dc8783ae68c99a42  corporate/3.0/x86_64/lib64net-snmp5-devel-5.1-7.4.C30mdk.x86_64.rpm\n 530a94cc87af0e4d6e9f3815473c0dd4  corporate/3.0/x86_64/lib64net-snmp5-static-devel-5.1-7.4.C30mdk.x86_64.rpm\n f246ca421b5d16c599d53f70e4b97660  corporate/3.0/x86_64/lib64snmp0-4.2.3-8.2.C30mdk.x86_64.rpm\n b943e07726a2fecb016ef4ba626906d8  corporate/3.0/x86_64/lib64snmp0-devel-4.2.3-8.2.C30mdk.x86_64.rpm\n 22822876f72e35cf6d1ed027df93e74a  corporate/3.0/x86_64/net-snmp-5.1-7.4.C30mdk.x86_64.rpm\n e7e51782b9bbd1e1bdf93c17fb953280  corporate/3.0/x86_64/net-snmp-mibs-5.1-7.4.C30mdk.x86_64.rpm\n e67a9105f9492c020693d48ce55652ea  corporate/3.0/x86_64/net-snmp-trapd-5.1-7.4.C30mdk.x86_64.rpm\n 171a17e507b2dfdb9c70c0089e582221  corporate/3.0/x86_64/net-snmp-utils-5.1-7.4.C30mdk.x86_64.rpm\n 96886146d21175b076e92d59e96f5016  corporate/3.0/x86_64/ucd-snmp-4.2.3-8.2.C30mdk.x86_64.rpm\n 1b6ee4c253f15be516a1928a4f791f15  corporate/3.0/x86_64/ucd-snmp-utils-4.2.3-8.2.C30mdk.x86_64.rpm \n ccaa4d311ad0e5d119e17b1f1876c7e2  corporate/3.0/SRPMS/net-snmp-5.1-7.4.C30mdk.src.rpm\n 53e16d2069cffb7e7d1e7a324192d5c2  corporate/3.0/SRPMS/ucd-snmp-4.2.3-8.2.C30mdk.src.rpm\n\n Corporate 4.0:\n 6cbe9d76db3b05c2435bcbc5cf16c898  corporate/4.0/i586/libnet-snmp5-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 586a55cfde45020d5ea0ebf5f2d6c840  corporate/4.0/i586/libnet-snmp5-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n d992d8300cf0639942a179349d592e15  corporate/4.0/i586/libnet-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 03a49b848c376b705dcfcef0ec817daf  corporate/4.0/i586/net-snmp-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 22b9d01b3b7a8a34ed3e1a5a435286a8  corporate/4.0/i586/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.i586.rpm\n dccc01a94c1f29eac2875e6a935bf589  corporate/4.0/i586/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 77f93230f96abce039b52ca5612eaa36  corporate/4.0/i586/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.i586.rpm\n 8a7209b70979c9d73035ff40cbd8dbb4  corporate/4.0/i586/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.i586.rpm \n ac919459a8752cddfd441c085ca69117  corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n f94c7e967973ba8aa12b5605251d6e78  corporate/4.0/x86_64/lib64net-snmp5-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n f332985986eff2d6c8a75b5c263dedb1  corporate/4.0/x86_64/lib64net-snmp5-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 82fc454916e75866370ee738292021c8  corporate/4.0/x86_64/lib64net-snmp5-static-devel-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n ff0adeb23df57eb34869c7100df159da  corporate/4.0/x86_64/net-snmp-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 72f2dc9cb1695999660a9ff9c97e4c47  corporate/4.0/x86_64/net-snmp-mibs-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 0f244551c87e051a8274e5050cf0bc2a  corporate/4.0/x86_64/net-snmp-trapd-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 7c4e7fb304c77c6551a50495d338e84e  corporate/4.0/x86_64/net-snmp-utils-5.2.1.2-5.2.20060mlcs4.x86_64.rpm\n 68d81ca4c173710ef43b36092df2a6ee  corporate/4.0/x86_64/perl-NetSNMP-5.2.1.2-5.2.20060mlcs4.x86_64.rpm \n ac919459a8752cddfd441c085ca69117  corporate/4.0/SRPMS/net-snmp-5.2.1.2-5.2.20060mlcs4.src.rpm\n\n Multi Network Firewall 2.0:\n f98286a301d580fe306917cf0169ef88  mnf/2.0/i586/libnet-snmp5-5.1-7.4.M20mdk.i586.rpm \n 3ba27516773b1dd933828207cecc7754  mnf/2.0/SRPMS/net-snmp-5.1-7.4.M20mdk.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi.  The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security",
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "BID",
            id: "29623",
         },
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            db: "PACKETSTORM",
            id: "71406",
         },
         {
            db: "PACKETSTORM",
            id: "68866",
         },
         {
            db: "PACKETSTORM",
            id: "68741",
         },
         {
            db: "PACKETSTORM",
            id: "72606",
         },
         {
            db: "PACKETSTORM",
            id: "67532",
         },
      ],
      trust: 3.24,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-31085",
            trust: 0.1,
            type: "unknown",
         },
         {
            reference: "https://vulmon.com/exploitdetails?qidtp=exploitdb&qid=5790",
            trust: 0.1,
            type: "exploit",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#878044",
            trust: 3.7,
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
            trust: 3.4,
         },
         {
            db: "OCERT",
            id: "OCERT-2008-006",
            trust: 2.9,
         },
         {
            db: "BID",
            id: "29623",
            trust: 2.9,
         },
         {
            db: "SECUNIA",
            id: "30574",
            trust: 2.8,
         },
         {
            db: "USCERT",
            id: "TA08-162A",
            trust: 2.6,
         },
         {
            db: "SECUNIA",
            id: "30665",
            trust: 2,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-2971",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1788",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1787",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1836",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1800",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2009-1612",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1797",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1801",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-1981",
            trust: 1.8,
         },
         {
            db: "VUPEN",
            id: "ADV-2008-2361",
            trust: 1.8,
         },
         {
            db: "EXPLOIT-DB",
            id: "5790",
            trust: 1.8,
         },
         {
            db: "SECUNIA",
            id: "32664",
            trust: 1.8,
         },
         {
            db: "SECUNIA",
            id: "35463",
            trust: 1.8,
         },
         {
            db: "SECUNIA",
            id: "33003",
            trust: 1.8,
         },
         {
            db: "SREASON",
            id: "3933",
            trust: 1.8,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2008/06/09/1",
            trust: 1.8,
         },
         {
            db: "SECTRACK",
            id: "1020218",
            trust: 1.8,
         },
         {
            db: "SECUNIA",
            id: "30802",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "30626",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "31334",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "30612",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "30615",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "31568",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "31351",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "30648",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "31467",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "30647",
            trust: 1.2,
         },
         {
            db: "SECUNIA",
            id: "30596",
            trust: 1.2,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
            trust: 0.8,
         },
         {
            db: "BUGTRAQ",
            id: "20081031 VMSA-2008-0017 UPDATED ESX PACKAGES FOR LIBXML2, UCD-SNMP, LIBTIFF",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING",
            trust: 0.6,
         },
         {
            db: "REDHAT",
            id: "RHSA-2008:0529",
            trust: 0.6,
         },
         {
            db: "MANDRIVA",
            id: "MDVSA-2008:118",
            trust: 0.6,
         },
         {
            db: "MILW0RM",
            id: "5790",
            trust: 0.6,
         },
         {
            db: "FEDORA",
            id: "FEDORA-2008-5218",
            trust: 0.6,
         },
         {
            db: "FEDORA",
            id: "FEDORA-2008-5215",
            trust: 0.6,
         },
         {
            db: "FEDORA",
            id: "FEDORA-2008-5224",
            trust: 0.6,
         },
         {
            db: "SUNALERT",
            id: "238865",
            trust: 0.6,
         },
         {
            db: "MLIST",
            id: "[OSS-SECURITY] 20080609 [OCERT-2008-006] MULTIPLE SNMP IMPLEMENTATIONS HMAC AUTHENTICATION SPOOFING",
            trust: 0.6,
         },
         {
            db: "CERT/CC",
            id: "TA08-162A",
            trust: 0.6,
         },
         {
            db: "UBUNTU",
            id: "USN-685-1",
            trust: 0.6,
         },
         {
            db: "DEBIAN",
            id: "DSA-1663",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20080610 SNMP VERSION 3 AUTHENTICATION VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "GENTOO",
            id: "GLSA-200808-02",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "67532",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "68741",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "68866",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "72606",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "67160",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "67231",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "67140",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "71748",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-31085",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "71406",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            db: "BID",
            id: "29623",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "PACKETSTORM",
            id: "71406",
         },
         {
            db: "PACKETSTORM",
            id: "68866",
         },
         {
            db: "PACKETSTORM",
            id: "68741",
         },
         {
            db: "PACKETSTORM",
            id: "72606",
         },
         {
            db: "PACKETSTORM",
            id: "67532",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   id: "VAR-200806-0575",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
      ],
      trust: 0.61355825,
   },
   last_update_date: "2024-07-23T22:03:53.151000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Security Update 2008-004",
            trust: 0.8,
            url: "http://support.apple.com/kb/ht2163",
         },
         {
            title: "net-snmp-5.3.1-19.1.1AXS3",
            trust: 0.8,
            url: "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=146",
         },
         {
            title: "cisco-sa-20080610-snmpv3",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
         },
         {
            title: "1291",
            trust: 0.8,
            url: "http://www.miraclelinux.com/update/linux/list.php?errata_id=1291",
         },
         {
            title: "1328",
            trust: 0.8,
            url: "http://www.miraclelinux.com/update/linux/list.php?errata_id=1328",
         },
         {
            title: "NV08-007",
            trust: 0.8,
            url: "http://www.nec.co.jp/security-info/secinfo/nv08-007.html",
         },
         {
            title: "Fixes VU#878044 and CVE-2008-0960",
            trust: 0.8,
            url: "https://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
         },
         {
            title: "RHSA-2008:0528",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2008-0528.html",
         },
         {
            title: "RHSA-2008:0529",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2008-0529.html",
         },
         {
            title: "Net-SNMP SNMPv3 USM 認証処理の脆弱性",
            trust: 0.8,
            url: "http://www.seil.jp/seilseries/security/2008/06111446.php",
         },
         {
            title: "238865",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1",
         },
         {
            title: "snmp_12",
            trust: 0.8,
            url: "http://fenics.fujitsu.com/products/support/2008/snmp_12.html",
         },
         {
            title: "SNMPv3に関する認証回避の脆弱性について",
            trust: 0.8,
            url: "http://www.allied-telesis.co.jp/support/list/faq/vuls/20080924.html",
         },
         {
            title: "AX-VU2008-02",
            trust: 0.8,
            url: "http://www.alaxala.com/jp/support/security/20080630.html",
         },
         {
            title: "RHSA-2008:0528",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0528j.html",
         },
         {
            title: "RHSA-2008:0529",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2008-0529j.html",
         },
         {
            title: "YSAR-15-0002: Vnet/IP用ネットワークスイッチにSNMPv3認証迂回の脆弱性",
            trust: 0.8,
            url: "http://www.yokogawa.co.jp/dcs/security/ysar/dcs-ysar-index-ja.htm",
         },
         {
            title: "SNMPv3",
            trust: 0.8,
            url: "http://www.hitachi.co.jp/prod/comp/network/notice/snmpv3.html",
         },
         {
            title: "TA08-162A",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/ta08-162a.html",
         },
         {
            title: "Debian CVElist Bug Report Logs: net-snmp: CVE-2008-0960 spoofing of authenticated SNMPv3 packets because only length of HMAC code is is taken into account for checks",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=a8541a6f686f7cf0c507fc152f31fed3",
         },
         {
            title: "Cisco: SNMP Version 3 Authentication Vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20080610-snmpv3",
         },
         {
            title: "Ubuntu Security Notice: net-snmp vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=usn-685-1",
         },
         {
            title: "Debian Security Advisories: DSA-1663-1 net-snmp -- several vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=61d231c8116737565b9155223d52d04c",
         },
         {
            title: "VMware Security Advisories: Updated ESX packages for libxml2, ucd-snmp, libtiff",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=4b3f89e87c3a2b8f6ca491f31d73afa9",
         },
         {
            title: "VMware Security Advisories: Updated ESX packages for OpenSSL, net-snmp, perl",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories&qid=66428db28c8b0a38eb32535e5949367a",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-287",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3,
            url: "http://www.kb.cert.org/vuls/id/878044",
         },
         {
            trust: 2.9,
            url: "http://www.ocert.org/advisories/ocert-2008-006.html",
         },
         {
            trust: 2.6,
            url: "http://sourceforge.net/forum/forum.php?forum_id=833770",
         },
         {
            trust: 2.6,
            url: "http://www.securityfocus.com/bid/29623",
         },
         {
            trust: 2.6,
            url: "http://www.us-cert.gov/cas/techalerts/ta08-162a.html",
         },
         {
            trust: 2.1,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
         },
         {
            trust: 2.1,
            url: "http://support.apple.com/kb/ht2163",
         },
         {
            trust: 2.1,
            url: "http://support.avaya.com/elmodocs2/security/asa-2008-282.htm",
         },
         {
            trust: 2.1,
            url: "http://www.kb.cert.org/vuls/id/mimg-7ets5z",
         },
         {
            trust: 2.1,
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
         },
         {
            trust: 1.9,
            url: "http://security.gentoo.org/glsa/glsa-200808-02.xml",
         },
         {
            trust: 1.8,
            url: "http://www.kb.cert.org/vuls/id/ctar-7fbs8q",
         },
         {
            trust: 1.8,
            url: "http://www.kb.cert.org/vuls/id/mimg-7ets87",
         },
         {
            trust: 1.8,
            url: "http://www.vmware.com/security/advisories/vmsa-2008-0013.html",
         },
         {
            trust: 1.8,
            url: "http://www.debian.org/security/2008/dsa-1663",
         },
         {
            trust: 1.8,
            url: "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00363.html",
         },
         {
            trust: 1.8,
            url: "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00459.html",
         },
         {
            trust: 1.8,
            url: "https://www.redhat.com/archives/fedora-package-announce/2008-june/msg00380.html",
         },
         {
            trust: 1.8,
            url: "http://www.mandriva.com/security/advisories?name=mdvsa-2008:118",
         },
         {
            trust: 1.8,
            url: "http://www.vmware.com/security/advisories/vmsa-2008-0017.html",
         },
         {
            trust: 1.8,
            url: "http://www.openwall.com/lists/oss-security/2008/06/09/1",
         },
         {
            trust: 1.8,
            url: "http://www.redhat.com/support/errata/rhsa-2008-0529.html",
         },
         {
            trust: 1.8,
            url: "http://www.securitytracker.com/id?1020218",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/32664",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/33003",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/35463",
         },
         {
            trust: 1.8,
            url: "http://securityreason.com/securityalert/3933",
         },
         {
            trust: 1.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1",
         },
         {
            trust: 1.8,
            url: "http://www.ubuntu.com/usn/usn-685-1",
         },
         {
            trust: 1.8,
            url: "http://www.vupen.com/english/advisories/2009/1612",
         },
         {
            trust: 1.7,
            url: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
         },
         {
            trust: 1.6,
            url: "http://secunia.com/advisories/30574/",
         },
         {
            trust: 1.5,
            url: "http://lists.ingate.com/pipermail/productinfo/2008/000021.html",
         },
         {
            trust: 1.5,
            url: "http://rhn.redhat.com/errata/rhsa-2008-0528.html",
         },
         {
            trust: 1.2,
            url: "http://lists.apple.com/archives/security-announce/2008//jun/msg00002.html",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/archive/1/493218/100/0/threaded",
         },
         {
            trust: 1.2,
            url: "http://www.securityfocus.com/archive/1/497962/100/0/threaded",
         },
         {
            trust: 1.2,
            url: "https://www.exploit-db.com/exploits/5790",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10820",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5785",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6414",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30574",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30596",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30612",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30615",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30626",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30647",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30648",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30665",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/30802",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/31334",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/31351",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/31467",
         },
         {
            trust: 1.2,
            url: "http://secunia.com/advisories/31568",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1787/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1788/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1797/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1800/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1801/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1836/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/1981/references",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/2361",
         },
         {
            trust: 1.2,
            url: "http://www.vupen.com/english/advisories/2008/2971",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
         },
         {
            trust: 1.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0960",
         },
         {
            trust: 0.8,
            url: "http://secunia.com/advisories/30665/",
         },
         {
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1 ",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnvu878044/",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnta08-162a/index.html",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/tr/trta08-162a/index.html",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0960",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/497962/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/493218/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://www.milw0rm.com/exploits/5790",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/2971",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/2361",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1981/references",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1836/references",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1801/references",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1800/references",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1797/references",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1788/references",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2008/1787/references",
         },
         {
            trust: 0.5,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-0960",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-2292",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/en/us/products/products_applied_mitigation_bulletin09186a00809adfc8.html",
         },
         {
            trust: 0.3,
            url: "http://www.net-snmp.org/",
         },
         {
            trust: 0.3,
            url: "http://www.ingate.com/relnote.php?ver=471",
         },
         {
            trust: 0.3,
            url: "/archive/1/493218",
         },
         {
            trust: 0.3,
            url: "/archive/1/493238",
         },
         {
            trust: 0.3,
            url: "/archive/1/493304",
         },
         {
            trust: 0.3,
            url: "/archive/1/495389",
         },
         {
            trust: 0.3,
            url: "http://support.avaya.com/elmodocs2/security/asa-2008-252.htm",
         },
         {
            trust: 0.3,
            url: "http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=766427",
         },
         {
            trust: 0.3,
            url: "http://support.nortel.com/go/main.jsp?cscat=bltndetail&documentoid=905600&poid=",
         },
         {
            trust: 0.3,
            url: "http://rhn.redhat.com/errata/rhsa-2008-0529.html",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1",
         },
         {
            trust: 0.2,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2292",
         },
         {
            trust: 0.1,
            url: "http://sourceforge.net/tracker/index.php?func=detail&amp;aid=1989089&amp;group_id=12694&amp;atid=456380",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&amp;m=127730470825399&amp;w=2",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/287.html",
         },
         {
            trust: 0.1,
            url: "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485945",
         },
         {
            trust: 0.1,
            url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20080610-snmpv3",
         },
         {
            trust: 0.1,
            url: "https://www.exploit-db.com/exploits/5790/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/685-1/",
         },
         {
            trust: 0.1,
            url: "http://download3.vmware.com/software/vi/esx303-200810503-sg.zip",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-3281",
         },
         {
            trust: 0.1,
            url: "http://vmware.com/support/esx25/doc/esx-255-200810-patch.html",
         },
         {
            trust: 0.1,
            url: "http://download3.vmware.com/software/esx/esx-2.5.4-119703-upgrade.tar.gz",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/1006968",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/1006971",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/security",
         },
         {
            trust: 0.1,
            url: "http://download3.vmware.com/software/vi/esx-1006968.tgz",
         },
         {
            trust: 0.1,
            url: "http://kb.vmware.com/kb/1055",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-2327",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2327",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/support/policies/security_response.html",
         },
         {
            trust: 0.1,
            url: "http://vmware.com/support/esx25/doc/esx-254-200810-patch.html",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3281",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/support/policies/eos.html",
         },
         {
            trust: 0.1,
            url: "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce",
         },
         {
            trust: 0.1,
            url: "http://download3.vmware.com/software/esx/esx-2.5.5-119702-upgrade.tar.gz",
         },
         {
            trust: 0.1,
            url: "http://www.vmware.com/support/policies/eos_vi.html",
         },
         {
            trust: 0.1,
            url: "http://bugs.gentoo.org.",
         },
         {
            trust: 0.1,
            url: "http://creativecommons.org/licenses/by-sa/2.5",
         },
         {
            trust: 0.1,
            url: "http://security.gentoo.org/",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/perl-snmp-5.4.1-19.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/src/net-snmp-5.4.1-77.2.src.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/libsnmp15-5.4.1-19.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-devel-5.4.1-19.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/libsnmp15-5.4.1-77.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/x86_64/net-snmp-32bit-5.4.1-77.2.x86_64.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/perl-snmp-5.4.1-77.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/src/net-snmp-5.4.1-19.2.src.rpm",
         },
         {
            trust: 0.1,
            url: "http://lists.grok.org.uk/full-disclosure-charter.html",
         },
         {
            trust: 0.1,
            url: "http://download.novell.com/index.jsp?search=search&keywords=71093bdfd49361f6dbe32a8fde43b848",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-5.4.1-77.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/x86_64/net-snmp-32bit-5.4.1-19.2.x86_64.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/snmp-mibs-5.4.1-77.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/snmp-mibs-5.4.1-19.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/10.3/rpm/i586/net-snmp-5.4.1-19.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://download.opensuse.org/pub/opensuse/update/11.0/rpm/i586/net-snmp-devel-5.4.1-77.2.i586.rpm",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-7.1ubuntu6.1_all.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.dsc",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.dsc",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.3.1-6ubuntu2.2_all.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1.orig.tar.gz",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2.orig.tar.gz",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.2.1.2-4ubuntu2.3_all.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-7.1ubuntu6.1_all.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.diff.gz",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9_5.2.1.2-4ubuntu2.3_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.3.1-6ubuntu2.2_all.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-4309",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-4ubuntu4.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-base_5.4.1~dfsg-4ubuntu4.2_all.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.4.1~dfsg-7.1ubuntu6.1_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-7.1ubuntu6.1.dsc",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg-4ubuntu4.2.diff.gz",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.3.1-6ubuntu2.2_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-4ubuntu4.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.4.1~dfsg.orig.tar.gz",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-4ubuntu4.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.dsc",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.3.1-6ubuntu2.2_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-perl_5.3.1-6ubuntu2.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmp_5.4.1~dfsg-4ubuntu4.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-perl_5.2.1.2-4ubuntu2.3_amd64.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp10_5.3.1-6ubuntu2.2_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.2.1.2-4ubuntu2.3.diff.gz",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.2.1.2-4ubuntu2.3_all.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmpd_5.2.1.2-4ubuntu2.3_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.2.1.2-4ubuntu2.3_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.3.1-6ubuntu2.2.diff.gz",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp9-dev_5.2.1.2-4ubuntu2.3_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-7.1ubuntu6.1_sparc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/snmpd_5.4.1~dfsg-4ubuntu4.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/snmp_5.3.1-6ubuntu2.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/universe/n/net-snmp/libsnmp-python_5.4.1~dfsg-4ubuntu4.2_powerpc.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp15_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://ports.ubuntu.com/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_lpia.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/universe/n/net-snmp/tkmib_5.4.1~dfsg-4ubuntu4.2_all.deb",
         },
         {
            trust: 0.1,
            url: "http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/libsnmp-dev_5.4.1~dfsg-7.1ubuntu6.1_i386.deb",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/security/",
         },
         {
            trust: 0.1,
            url: "http://www.mandriva.com/security/advisories",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            db: "BID",
            id: "29623",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "PACKETSTORM",
            id: "71406",
         },
         {
            db: "PACKETSTORM",
            id: "68866",
         },
         {
            db: "PACKETSTORM",
            id: "68741",
         },
         {
            db: "PACKETSTORM",
            id: "72606",
         },
         {
            db: "PACKETSTORM",
            id: "67532",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            db: "BID",
            id: "29623",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            db: "PACKETSTORM",
            id: "71406",
         },
         {
            db: "PACKETSTORM",
            id: "68866",
         },
         {
            db: "PACKETSTORM",
            id: "68741",
         },
         {
            db: "PACKETSTORM",
            id: "72606",
         },
         {
            db: "PACKETSTORM",
            id: "67532",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-06-10T00:00:00",
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            date: "2008-06-10T00:00:00",
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            date: "2008-06-10T00:00:00",
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            date: "2008-06-10T00:00:00",
            db: "BID",
            id: "29623",
         },
         {
            date: "2008-07-03T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            date: "2008-10-31T18:41:56",
            db: "PACKETSTORM",
            id: "71406",
         },
         {
            date: "2008-08-06T21:36:36",
            db: "PACKETSTORM",
            id: "68866",
         },
         {
            date: "2008-08-01T20:22:12",
            db: "PACKETSTORM",
            id: "68741",
         },
         {
            date: "2008-12-04T02:50:13",
            db: "PACKETSTORM",
            id: "72606",
         },
         {
            date: "2008-06-21T01:10:58",
            db: "PACKETSTORM",
            id: "67532",
         },
         {
            date: "2008-06-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            date: "2008-06-10T18:32:00",
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2009-07-16T00:00:00",
            db: "CERT/CC",
            id: "VU#878044",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULHUB",
            id: "VHN-31085",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULMON",
            id: "CVE-2008-0960",
         },
         {
            date: "2015-04-13T22:21:00",
            db: "BID",
            id: "29623",
         },
         {
            date: "2016-11-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2008-001431",
         },
         {
            date: "2011-07-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
         {
            date: "2018-10-30T16:25:36.577000",
            db: "NVD",
            id: "CVE-2008-0960",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "72606",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "SNMPv3 improper HMAC validation allows authentication bypass",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#878044",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "authorization issue",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200806-140",
         },
      ],
      trust: 0.6,
   },
}

var-200210-0004
Vulnerability from variot

Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request. Certain versions of Cisco CatOS ship with an embedded HTTP server. This issue is reported to affect CatOS versions 5.4 through 7.4 which contain "cv" in the image name

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200210-0004",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 2.2,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(13a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "6.1\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "5976",
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(13a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Vulnerability announced in a Cisco Security Advisory.",
      sources: [
         {
            db: "BID",
            id: "5976",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2002-1222",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.1,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 8.6,
                  id: "VHN-5607",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2002-1222",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200210-286",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-5607",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request. Certain versions of Cisco CatOS ship with an embedded HTTP server. \nThis issue is reported to affect CatOS versions 5.4 through 7.4 which contain \"cv\" in the image name",
      sources: [
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            db: "BID",
            id: "5976",
         },
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
      ],
      trust: 1.26,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-5607",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "5976",
            trust: 2,
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
            trust: 2,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20021016 CISCO CATOS EMBEDDED HTTP SERVER BUFFER OVERFLOW",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "10382",
            trust: 0.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "21944",
            trust: 0.1,
         },
         {
            db: "SEEBUG",
            id: "SSVID-75759",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-5607",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            db: "BID",
            id: "5976",
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   id: "VAR-200210-0004",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:16:16.688000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/5976",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.iss.net/security_center/static/10382.php",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            db: "BID",
            id: "5976",
         },
         {
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2002-10-28T00:00:00",
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            date: "2002-10-16T00:00:00",
            db: "BID",
            id: "5976",
         },
         {
            date: "2002-10-28T05:00:00",
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            date: "2002-10-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-09-10T00:00:00",
            db: "VULHUB",
            id: "VHN-5607",
         },
         {
            date: "2009-07-11T18:06:00",
            db: "BID",
            id: "5976",
         },
         {
            date: "2008-09-10T19:14:04.743000",
            db: "NVD",
            id: "CVE-2002-1222",
         },
         {
            date: "2005-05-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco CatOS CiscoView HTTP Server Buffer Overflow Vulnerability",
      sources: [
         {
            db: "BID",
            id: "5976",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
      trust: 0.9,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200210-286",
         },
      ],
      trust: 0.6,
   },
}

var-200506-0251
Vulnerability from variot

IEEE 802.1X is a standard for authenticating network clients (or ports) based on user IDs or devices. An authentication bypass vulnerability exists in Cisco switches that allows an attacker to anonymously access a voice VLAN. An attacker can spoof CDP packets, play Cisco IP phones, and join voice VLANs anonymously. This may allow an attacker to access network resources without the expected 802.1x authentication. Because network administrators may think that switch port access is limited to authenticated users, it can lead to erroneous security awareness. Once an attacker gains access to a voice VLAN, they can launch further attacks on the server or host, or eavesdrop on VOIP sessions. Further network attacks are also possible at this point

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200506-0251",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catos",
            scope: "eq",
            trust: 3.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 2.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "catalyst csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "60005.3",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 2.4,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 1.2,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60005.5",
         },
         {
            model: "catos glx",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "50006.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40005.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "4.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "40006.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.9,
            vendor: "cisco",
            version: "60006.1",
         },
         {
            model: "voice vlan",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "802.1x",
         },
         {
            model: "catos csx",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50005.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "50004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "40005.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(11)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(5)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2",
         },
         {
            model: "catos clr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "28209.00.07",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65096.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(8)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx2.1.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29005.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(11)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(3)",
         },
         {
            model: "catalyst 4840g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "39203.0(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4",
         },
         {
            model: "catalyst 2980g-a",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(10)",
         },
         {
            model: "catalyst native mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65096.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(2)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(1)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(2.13)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx1.0",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55055.5(19)",
         },
         {
            model: "catalyst ids module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "19009.00.07",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "catalyst 4510r",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catalyst 2948g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(19)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4232",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(13)",
         },
         {
            model: "catalyst series ssl services module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(5)",
         },
         {
            model: "catos sa6",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "catalyst 8540csr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4503",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx2.4.401",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12xx4.30",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(9)",
         },
         {
            model: "catalyst hybrid mode",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(18)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1",
         },
         {
            model: "catalyst 2948g-ge-tx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.3(4)",
         },
         {
            model: "catalyst lre",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2950",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40006.3.5",
         },
         {
            model: "catalyst metro",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3750",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(5)",
         },
         {
            model: "catalyst network analysis module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2902",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2948",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6608",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
         {
            model: "catos ea1c",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(4)",
         },
         {
            model: "catalyst msm",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55006.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4200",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2950",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29004.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "catalyst 8540msr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(14)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(6)",
         },
         {
            model: "catalyst 8510csr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2920",
         },
         {
            model: "catalyst pan",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "catalyst sup2/msfc2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(7)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx2.1.5",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(9)",
         },
         {
            model: "catalyst 2948g-l3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(3)",
         },
         {
            model: "catalyst sup2plus",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(7)",
         },
         {
            model: "catos",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3(1)",
         },
         {
            model: "catalyst 2926gs",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst xl",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1900",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.6(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29006.1(2)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx2.1.6",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4500",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx2.1.502",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(1)",
         },
         {
            model: "catalyst 4507r",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16)",
         },
         {
            model: "catalyst sup720/msfc3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "catalyst xu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "290012.0",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65097.6(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "call manager",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5.5",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst sup5",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "55005.4.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2800",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst sup4",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29005.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1(2)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx2.4.401",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6624",
         },
         {
            model: "catalyst supervisor module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(6)",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8500",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catalyst ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst xl",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13.5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29006.1(3)",
         },
         {
            model: "catalyst sup2plus",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16.2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(13)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(13)",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(12)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(6)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(11)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4948",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40066.3(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "1200",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5505",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(7)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(4)",
         },
         {
            model: "catalyst sup2/msfc2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst access gateway switch",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4224",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(5)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65007.5(1)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx2.1.6",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(4)",
         },
         {
            model: "catalyst sup3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4232-13",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12xx4.29",
         },
         {
            model: "catalyst msfc2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst 4908g-l3",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst sa6",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "290011.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(5)",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "catalyst lre xl",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2900",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2955",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.110)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.6(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(9)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65003.1",
         },
         {
            model: "catalyst sup720/msfc3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx2.1.1102",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(5)",
         },
         {
            model: "catalyst 2926t",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(10)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(9)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3200",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65007.6(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(14)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(9)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos cv",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(8)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40067.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(10)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2901",
         },
         {
            model: "catalyst 8510msr",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4506",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catalyst msfc",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6000",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2940",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(15)",
         },
         {
            model: "catalyst xu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "350012.0",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.3(4)",
         },
         {
            model: "catalyst 2980g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catos gdr",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(8)-",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60007.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2926",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60006.2(0.111)",
         },
         {
            model: "call manager",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.3(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4800",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx2.1.502",
         },
         {
            model: "catalyst series ssl services module",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(3)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(11)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50004.5(12)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3550",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29004.5(11)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.2(4)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(20)",
         },
         {
            model: "catalyst sup3",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4000",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(8)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(3)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50006.1(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.5(7)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "catalyst 2926f",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5509",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40004.5(8)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5xxx2.1.501",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3900",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4.1",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx2.1.501",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx1.0",
         },
         {
            model: "catos wc8",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "catalyst sup2plus ts",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "4500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "50005.4(2)",
         },
         {
            model: "catalyst supervisor software",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "29xx2.1.1102",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.2(2)",
         },
         {
            model: "catalyst 2926gl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3560",
         },
         {
            model: "catalyst ws-c2924m-xl",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 4912g",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(1)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2970",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60005.4.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40005.4(2)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3750",
         },
         {
            model: "catos deferred",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)-",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2820",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(3)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.1",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "40007.1.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            db: "BID",
            id: "13902",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FishNet Security is credited with the discovery of this vulnerability.",
      sources: [
         {
            db: "BID",
            id: "13902",
         },
      ],
      trust: 0.3,
   },
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 6.8,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CNVD-2005-2104",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "CNVD",
                  id: "CNVD-2005-2104",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IEEE 802.1X is a standard for authenticating network clients (or ports) based on user IDs or devices. An authentication bypass vulnerability exists in Cisco switches that allows an attacker to anonymously access a voice VLAN. An attacker can spoof CDP packets, play Cisco IP phones, and join voice VLANs anonymously. This may allow an attacker to access network resources without the expected 802.1x authentication. Because network administrators may think that switch port access is limited to authenticated users, it can lead to erroneous security awareness. Once an attacker gains access to a voice VLAN, they can launch further attacks on the server or host, or eavesdrop on VOIP sessions. Further network attacks are also possible at this point",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            db: "BID",
            id: "13902",
         },
      ],
      trust: 0.81,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "BID",
            id: "13902",
            trust: 0.9,
         },
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            db: "BID",
            id: "13902",
         },
      ],
   },
   id: "VAR-200506-0251",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
      ],
      trust: 1.1420429699999999,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
      ],
   },
   last_update_date: "2022-05-17T02:02:57.482000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Cisco Voice VLAN 802.1x authentication bypass vulnerability patch",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchinfo/show/42931",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 0.9,
            url: "http://www.cisco.com/warp/public/707/cisco-sn-20050608-8021x.shtml",
         },
         {
            trust: 0.3,
            url: "http://www.fishnetsecurity.com/csirt/disclosure/cisco/",
         },
         {
            trust: 0.3,
            url: "/archive/1/401938",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            db: "BID",
            id: "13902",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            db: "BID",
            id: "13902",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-06-13T00:00:00",
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            date: "2005-06-09T00:00:00",
            db: "BID",
            id: "13902",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2014-01-23T00:00:00",
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            date: "2005-06-09T00:00:00",
            db: "BID",
            id: "13902",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "network",
      sources: [
         {
            db: "BID",
            id: "13902",
         },
      ],
      trust: 0.3,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Voice VLAN 802.1x Authentication Bypass Vulnerability",
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2005-2104",
         },
         {
            db: "BID",
            id: "13902",
         },
      ],
      trust: 0.9,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Access Validation Error",
      sources: [
         {
            db: "BID",
            id: "13902",
         },
      ],
      trust: 0.3,
   },
}

var-200102-0077
Vulnerability from variot

Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability

By Sowhat of Nevis Labs Date: 2006.04.11

http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx

CVE: CVE-2006-1189

Vendor Microsoft Inc.

Products affected:

Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4 and Microsoft Windows XP Service Pack 1 Internet Explorer 6 for Microsoft Windows XP Service Pack 2 Internet Explorer 6 for Microsoft Windows Server 2003 Internet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft Windows 98 SE, and Microsoft Windows Millennium Edition

This vulnerability affects systems that use Double-Byte Character Sets. Systems that are affected are Windows language versions that use a Double Byte Character Set language. Examples of languages that use DBCS are Chinese, Japanese, and Korean languages. Customers using other language versions of Windows might also be affected if "Language for non-Unicode programs" has been set to a Double Byte Character Set language.

Overview:

There exists a buffer overflow in Microsoft Internet Explorer in the parsing of DBCS URLS.

This vulnerability could allow an attacker to execute arbitrary code on the victim's system when the victim visits a web page or views an HTML email message.

This attack may be utilized wherever IE parses HTML, such as webpages, email, newsgroups, and within applications utilizing web-browsing functionality.

Details:

URLMON.DLL does not properly validate IDN containing double-byte character sets (DBCS), which may lead to remote code execution.

Exploiting this vulnerability seems to need a lot of more work but we believe that exploitation is possible.

POC:

No PoC will be released for this.

FIX:

Microsoft has released an update for Internet Explorer which is set to address this issue. This can be downloaded from:

http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx

Vendor Response:

2005.12.29 Vendor notified via secure@microsoft.com 2005.12.29 Vendor responded 2006.04.11 Vendor released MS06-0xx patch 2006.04.11 Advisory released

Common Vulnerabilities and Exposures (CVE) Information:

The Common Vulnerabilities and Exposures (CVE) project has assigned the following names to these issues. These are candidates for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems.

    CVE-2006-1189

Greetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys, all XFocus and 0x557 guys :)

References:

  1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx
  2. http://www.nsfocus.com/english/homepage/research/0008.htm
  3. http://xforce.iss.net/xforce/xfdb/5729
  4. http://www.securityfocus.com/bid/2100/discuss
  5. http://www.inter-locale.com/whitepaper/IUC27-a303.html
  6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx
  7. [Mozilla Firefox IDN "Host:" Buffer Overflow] http://www.security-protocols.com/advisory/sp-x17-advisory.txt
  8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow] http://www.security-protocols.com/advisory/sp-x18-advisory.txt
  9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com /research/devnotes/1995/may/02/05.htm

-- Sowhat http://secway.org "Life is like a bug, Do you know how to exploit it ?"

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200102-0077",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 2.4,
            vendor: "ibm",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.3\\(4\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.5\\(4a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.3\\(3\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "4.5\\(9\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.2\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "4.5\\(8\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "5.3\\(5\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(2a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(5a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(6\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(6\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(2\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(4\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(5\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(7\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1a\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2\\(2\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.5\\(3\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.3\\(1\\)csx",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.5\\(3\\)",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(2a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(6\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(8\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(9\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(2\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(3\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(3\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(5\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(4\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(5\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(6\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:4.5\\(7\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.3\\(1a\\)csx:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.5\\(4a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Sowhat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "45442",
         },
      ],
      trust: 0.1,
   },
   cve: "CVE-2001-0041",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.8,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-2863",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2001-0041",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#739201",
                  trust: 0.8,
                  value: "7.09",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#808633",
                  trust: 0.8,
                  value: "5.36",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#872257",
                  trust: 0.8,
                  value: "7.09",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#886953",
                  trust: 0.8,
                  value: "15.19",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200102-093",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-2863",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts. There is a buffer overflow in the IBM AIX setclock command that may allow local attackers to gain root privileges. Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability\n\nBy Sowhat of Nevis Labs\nDate: 2006.04.11\n\nhttp://www.nevisnetworks.com\nhttp://secway.org/advisory/AD20060411.txt\nhttp://www.microsoft.com/technet/security/bulletin/MS06-013.mspx\n\n\nCVE: CVE-2006-1189\n\nVendor\nMicrosoft Inc. \n\nProducts affected:\n\nInternet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4\n\tand Microsoft Windows XP Service Pack 1\nInternet Explorer 6 for Microsoft Windows XP Service Pack 2\nInternet Explorer 6 for Microsoft Windows Server 2003\nInternet Explorer 6 Service Pack 1 on Microsoft Windows 98, Microsoft\n\tWindows 98 SE, and Microsoft Windows Millennium Edition\n\n\n\nThis vulnerability affects systems that use Double-Byte Character Sets. \nSystems that are affected are Windows language versions that use a\nDouble Byte Character Set language. Examples of languages that use DBCS\nare Chinese, Japanese, and Korean languages. Customers using\nother language versions of Windows might also be affected if \"Language\nfor non-Unicode programs\" has been set to a Double Byte Character Set\nlanguage. \n\n\nOverview:\n\nThere exists a buffer overflow in Microsoft Internet Explorer in the\nparsing of DBCS URLS. \n\nThis vulnerability could allow an attacker to execute arbitrary code on the\nvictim's system when the victim visits a web page or views an HTML email\nmessage. \n\nThis attack may be utilized wherever IE parses HTML, such as webpages, email,\nnewsgroups, and within applications utilizing web-browsing functionality. \n\n\nDetails:\n\nURLMON.DLL does not properly validate IDN containing double-byte character\nsets (DBCS), which may lead to remote code execution. \n\nExploiting this vulnerability seems to need a lot of more work but we\nbelieve that\nexploitation is possible. \n\n\nPOC:\n\nNo PoC will be released for this. \n\n\nFIX:\n\nMicrosoft has released an update for Internet Explorer which is\nset to address this issue. This can be downloaded from:\n\nhttp://www.microsoft.com/technet/security/bulletin/MS06-013.mspx\n\n\nVendor Response:\n\n2005.12.29 Vendor notified via secure@microsoft.com\n2005.12.29 Vendor responded\n2006.04.11 Vendor released MS06-0xx patch\n2006.04.11 Advisory released\n\n\nCommon Vulnerabilities and Exposures (CVE) Information:\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned\nthe following names to these issues.  These are candidates for\ninclusion in the CVE list (http://cve.mitre.org), which standardizes\nnames for security problems. \n\n\n        CVE-2006-1189\n\n\nGreetings to Lennart@MS, Chi, OYXin, Narasimha Datta, all Nevis Labs guys,\n all XFocus and 0x557 guys :)\n\n\nReferences:\n\n1. http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx\n2. http://www.nsfocus.com/english/homepage/research/0008.htm\n3. http://xforce.iss.net/xforce/xfdb/5729\n4. http://www.securityfocus.com/bid/2100/discuss\n5. http://www.inter-locale.com/whitepaper/IUC27-a303.html\n6. http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx\n7. [Mozilla Firefox IDN \"Host:\" Buffer Overflow]\n   http://www.security-protocols.com/advisory/sp-x17-advisory.txt\n8. [Mozilla Firefox 1.5 Beta 1 IDN Buffer Overflow]\n   http://www.security-protocols.com/advisory/sp-x18-advisory.txt\n9. http://72.14.203.104/search?q=cache:Dxn-V4fil1IJ:developer.novell.com\n\t /research/devnotes/1995/may/02/05.htm\n\n\n\n\n\n\n\n--\nSowhat\nhttp://secway.org\n\"Life is like a bug, Do you know how to exploit it ?\"\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            db: "PACKETSTORM",
            id: "45442",
         },
      ],
      trust: 3.96,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-2863",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "OSVDB",
            id: "801",
            trust: 1.7,
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
            trust: 1.7,
         },
         {
            db: "BID",
            id: "2072",
            trust: 1.7,
         },
         {
            db: "BID",
            id: "2035",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "5618",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#739201",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2033",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "5620",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2034",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "5619",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#872257",
            trust: 0.8,
         },
         {
            db: "BID",
            id: "2032",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "5621",
            trust: 0.8,
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20001206 CISCO CATALYST MEMORY LEAK VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "5656",
            trust: 0.6,
         },
         {
            db: "EXPLOIT-DB",
            id: "20473",
            trust: 0.1,
         },
         {
            db: "SEEBUG",
            id: "SSVID-74350",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-2863",
            trust: 0.1,
         },
         {
            db: "XF",
            id: "5729",
            trust: 0.1,
         },
         {
            db: "BID",
            id: "2100",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "45442",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            db: "PACKETSTORM",
            id: "45442",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   id: "VAR-200102-0077",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-07-23T21:24:52.601000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-399",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/2072",
         },
         {
            trust: 1.7,
            url: "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/801",
         },
         {
            trust: 1.6,
            url: "http://techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=dvhuron.boulder.ibm.com+dbaix+da139925+stiy08143+usbin",
         },
         {
            trust: 1.6,
            url: "http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=iy08143",
         },
         {
            trust: 1.6,
            url: "http://techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=dvhuron.boulder.ibm.com+dbaix+da137627+stiy08287+usbin",
         },
         {
            trust: 1.6,
            url: "http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=iy08287",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2035",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/5618.php",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=dvhuron.boulder.ibm.com+dbaix+da139817+stiy07831+usbin",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=iy07831",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=dvhuron.boulder.ibm.com+dbaix+da137621+stiy07790+usbin",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=iy07790",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2033",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/5620.php",
         },
         {
            trust: 0.8,
            url: "http://www.rs6000.ibm.com/idd500/usr/share/man/info/en_us/a_doc_lib/cmds/aixcmds2/digest.htm#a26p05a6",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2034",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/5619.php",
         },
         {
            trust: 0.8,
            url: "http://www.rs6000.ibm.com/idd500/usr/share/man/info/en_us/a_doc_lib/cmds/aixcmds2/enq.htm#a200977f",
         },
         {
            trust: 0.8,
            url: "http://www.securityfocus.com/bid/2032",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/static/5621.php",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=dvhuron.boulder.ibm.com+dbaix+da114623+stiy10721+usbin",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=iy10721",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/rs6000/aix.uhuic_getrec?args=dvhuron.boulder.ibm.com+dbaix+da123587+stiy08812+usbin",
         },
         {
            trust: 0.8,
            url: "http://techsupport.services.ibm.com/support/rs6000.support/fixsearch?fixdb=aix4&srchtype=apar&query=iy08812",
         },
         {
            trust: 0.8,
            url: "http://www.rs6000.ibm.com/doc_link/en_us/a_doc_lib/cmds/aixcmds5/setsenv.htm#wpg2f0frit",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/static/5656.php",
         },
         {
            trust: 0.1,
            url: "http://www.inter-locale.com/whitepaper/iuc27-a303.html",
         },
         {
            trust: 0.1,
            url: "http://xforce.iss.net/xforce/xfdb/5729",
         },
         {
            trust: 0.1,
            url: "http://www.security-protocols.com/advisory/sp-x17-advisory.txt",
         },
         {
            trust: 0.1,
            url: "http://www.nsfocus.com/english/homepage/research/0008.htm",
         },
         {
            trust: 0.1,
            url: "http://www.microsoft.com/technet/security/bulletin/ms06-013.mspx",
         },
         {
            trust: 0.1,
            url: "http://www.nevisnetworks.com",
         },
         {
            trust: 0.1,
            url: "http://blogs.msdn.com/michkap/archive/2005/10/28/486034.aspx",
         },
         {
            trust: 0.1,
            url: "http://www.security-protocols.com/advisory/sp-x18-advisory.txt",
         },
         {
            trust: 0.1,
            url: "http://secway.org",
         },
         {
            trust: 0.1,
            url: "http://www.securityfocus.com/bid/2100/discuss",
         },
         {
            trust: 0.1,
            url: "http://secway.org/advisory/ad20060411.txt",
         },
         {
            trust: 0.1,
            url: "http://cve.mitre.org),",
         },
         {
            trust: 0.1,
            url: "http://72.14.203.104/search?q=cache:dxn-v4fil1ij:developer.novell.com",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            db: "PACKETSTORM",
            id: "45442",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            db: "PACKETSTORM",
            id: "45442",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            date: "2001-02-16T00:00:00",
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            date: "2006-04-14T01:00:47",
            db: "PACKETSTORM",
            id: "45442",
         },
         {
            date: "2001-02-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            date: "2001-02-16T05:00:00",
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#739201",
         },
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#808633",
         },
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#872257",
         },
         {
            date: "2001-09-28T00:00:00",
            db: "CERT/CC",
            id: "VU#886953",
         },
         {
            date: "2017-10-10T00:00:00",
            db: "VULHUB",
            id: "VHN-2863",
         },
         {
            date: "2005-05-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
         {
            date: "2017-10-10T01:29:33.373000",
            db: "NVD",
            id: "CVE-2001-0041",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "PACKETSTORM",
            id: "45442",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "IBM AIX setclock buffer overflow in remote timeserver argument",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#739201",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200102-093",
         },
      ],
      trust: 0.6,
   },
}

var-200503-0138
Vulnerability from variot

Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and earlier allows remote attackers to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet. Cisco VPN 3000 Concentrator products are reported prone to a remote denial of service vulnerability. A remote unauthenticated attacker may trigger this vulnerability to cause an affected device to reload or drop connections. Specifically, an attacker can target the HTTPS service running on a vulnerable device to trigger this vulnerability. Cisco VPN 3000 Concentrator products running software version 4.1.7.A and prior are affected by this issue

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200503-0138",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "ios 12.2",
            scope: "ne",
            trust: 6.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0",
            scope: "ne",
            trust: 5.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s",
            scope: "ne",
            trust: 4.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1",
            scope: "ne",
            trust: 4.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s",
            scope: "ne",
            trust: 3.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e",
            scope: "ne",
            trust: 3.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 w5",
            scope: "ne",
            trust: 3.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t",
            scope: "ne",
            trust: 3.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "ne",
            trust: 3.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 2.7,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "ios 12.0 s1",
            scope: "ne",
            trust: 2.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos csx",
            scope: "ne",
            trust: 2.4,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "ios 12.3",
            scope: "ne",
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b",
            scope: "ne",
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e1",
            scope: "ne",
            trust: 2.1,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s6",
            scope: "ne",
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s4",
            scope: "ne",
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s7",
            scope: "ne",
            trust: 1.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 1.5,
            vendor: "cisco",
            version: "30002.5.2",
         },
         {
            model: "ios 12.1 ex",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e3",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s8",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st",
            scope: "ne",
            trust: 1.5,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bx",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ey",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e12",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 dc2",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 t",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s2",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s5",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s3",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "catos csx",
            scope: "ne",
            trust: 1.2,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0.3.b",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1.5.b",
         },
         {
            model: "vpn 3005 concentrator software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.0.1",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5.2.c",
         },
         {
            model: "vpn 3020 concentrator",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7.a",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.5.2",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5.2.d",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.0",
         },
         {
            model: "vpn 3030 concentator",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7.b",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7d",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.5.4",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.5.3",
         },
         {
            model: "vpn 3002 hardware client",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.0.5.b",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6",
         },
         {
            model: "vpn 3060 concentrator",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vpn 3015 concentrator",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.5.1",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.3",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7.c",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5.2.f",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1.2",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1.7.a",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.5.5",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1.4",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.0.1",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.5",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1.1",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7.d",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(rel\\)",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5.2.a",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.5.2.b",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.1",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0.4",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0.3.a",
         },
         {
            model: "vpn 3080 concentrator",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.6.7.f",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.5\\(rel\\)",
         },
         {
            model: "vpn 3000 concentrator series software",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "4.1",
         },
         {
            model: "ios 12.3 t4",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ja",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t1",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ja1",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sw",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t9",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e9",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e8",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 dc",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db1",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e7",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sx",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st6",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st1",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos glx",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: "5.4",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.9,
            vendor: "cisco",
            version: "4.5",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "30003.1",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "30003.0.3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: "12.0.7",
         },
         {
            model: "ios 12.3 t8",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t3",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t3",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 se",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sv",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s2",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ewa",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xh",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xa",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxa",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zl",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zk",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t8",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mc1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 aa",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e14",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ew1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2b",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e6",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1a",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm4",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db2",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 db",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eb",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e5",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e4",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sc",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xk2",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xk",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 t2",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc1",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xu",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe?",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st7",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s5a",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st2",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 xa",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 p",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.0",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: "7.1",
         },
         {
            model: "catos csx",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.5.2.f",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.1.1",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.0.3.a",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.1\\(rel\\)",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.5.2.d",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "2.5.2.c",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.0.4",
         },
         {
            model: "vpn 3000 concentrator",
            scope: "eq",
            trust: 0.6,
            vendor: "cisco",
            version: "3.0.3.b",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3080",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3060",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3030",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3020",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3015",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30054.0.1",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30054.0",
         },
         {
            model: "vpn concentrator f",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.7",
         },
         {
            model: "vpn concentrator d",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.7",
         },
         {
            model: "vpn concentrator c",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.7",
         },
         {
            model: "vpn concentrator b",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.7",
         },
         {
            model: "vpn concentrator a",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.7",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.7",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.5",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30053.6.3",
         },
         {
            model: "vpn hardware client",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3002",
         },
         {
            model: "vpn concentrator .b",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30004.1.5",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30004.1.x",
         },
         {
            model: "vpn concentrator .b",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30004.0.5",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30004.0.1",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30004.0.x",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30004.0",
         },
         {
            model: "vpn concentrator d",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.6.7",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.6.7",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.6.1",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.6",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.5.5",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.5.4",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.5.3",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.5.2",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.5.1",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.5",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.1.4",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.1.2",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.1.1",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.0.4",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30003.0",
         },
         {
            model: "vpn concentrator",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "30002.0",
         },
         {
            model: "vpn concentrator 4.1.7.a",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "vpn concentrator",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5008",
         },
         {
            model: "vpn concentrator",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5002",
         },
         {
            model: "vpn concentrator",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5001",
         },
         {
            model: "vpn concentrator 4.1.7.b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3000",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5350",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5256.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "520",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "515",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5060",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5010",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3.3(133)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3.2",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3.1",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3.109)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3.102)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.3(110)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.2.111",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.2",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2.1",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3.100)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.5(104)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.5",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.4",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(5)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.4",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(4.101)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(4)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(2)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0(1)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.0",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.3(3)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.3(2)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.3(1.200)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.3(1)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(9)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3.210)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1.4",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(4.206)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.0",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(8)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(7.202)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(4)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2.2",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2.1",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(5)",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2",
         },
         {
            model: "pix firewall b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1.6",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1.6",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.0",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0",
         },
         {
            model: "pix firewall",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.7",
         },
         {
            model: "ipsec vpn services module",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.19",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.6",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.5",
         },
         {
            model: "ios t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios s",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.4",
         },
         {
            model: "ios t2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.3",
         },
         {
            model: "ios xg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.2",
         },
         {
            model: "ios xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios xb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios xa3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios w",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0.1",
         },
         {
            model: "ios b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.11",
         },
         {
            model: "ios t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.1",
         },
         {
            model: "ios ed",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.1",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3.1",
         },
         {
            model: "ios bc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.10",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.10",
         },
         {
            model: "ios xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.9",
         },
         {
            model: "ios p",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.9",
         },
         {
            model: "ios sa5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios sa3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios sa1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios p",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.8",
         },
         {
            model: "ios f1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.4",
         },
         {
            model: "ios f",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.4",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2.4",
         },
         {
            model: "ios ct",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.17",
         },
         {
            model: "ios cc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.17",
         },
         {
            model: "ios ia",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.16",
         },
         {
            model: "ios aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.16",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.16",
         },
         {
            model: "ios ia",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios ca",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.15",
         },
         {
            model: "ios ia",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios ca",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.13",
         },
         {
            model: "ios ia",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.9",
         },
         {
            model: "ios ca",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.7",
         },
         {
            model: "ios aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.7",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1.7",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.20.3",
         },
         {
            model: "ios bt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.17",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.17",
         },
         {
            model: "ios bt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.12",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0.12",
         },
         {
            model: "ios a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.19",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.16",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.4.3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.4.2",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.3.4",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3.3.3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.0",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "1.0",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.14",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.1",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "9.0",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "ios 12.3yl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ye",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3yc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ya",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3xx",
         },
         {
            model: "ios 12.3xw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3xv",
         },
         {
            model: "ios 12.3xu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3ja",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3bw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3bc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 bc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(9)",
         },
         {
            model: "ios 12.3 yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xu2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(7.7)",
         },
         {
            model: "ios 12.3 xr3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(6)",
         },
         {
            model: "ios 12.3 b2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 b1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3(5)",
         },
         {
            model: "ios 12.3 xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xg1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 t1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 eo1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 xc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.3 ja",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.3",
         },
         {
            model: "ios 12.2zq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zo",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ze",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2zb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2za",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yv",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ys",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yo",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ym",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ye",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2yb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ya",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2xv",
         },
         {
            model: "ios 12.2xu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xb15",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sv",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2su",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2se",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2s",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2pi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2pb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2mb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2jk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ja",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ewa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ew",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2dx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2dd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2da",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2cx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2by",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2bc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zb7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yy3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yw3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yw2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t10",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(7)",
         },
         {
            model: "ios 12.2 t1a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t0a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ca1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(5)",
         },
         {
            model: "ios 12.2 yb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ya",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xw1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xm2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xl4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mx1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 mb12",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 b2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(4)",
         },
         {
            model: "ios 12.2 bp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(3)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(24)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(23.6)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(23)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(21)",
         },
         {
            model: "ios 12.2 se3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xu2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xt3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xk2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xj1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xi2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xi1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xh3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xh2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb15",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb14",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb11",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xa5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xa1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 dd3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 by2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 by",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(19)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(18.2)",
         },
         {
            model: "ios 12.2 sxd1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ew2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(17)",
         },
         {
            model: "ios 12.2 zo",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zl1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zj1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ys/1.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xr2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sl1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 jk2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 cx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc1f",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(14.5)",
         },
         {
            model: "ios 12.2 za8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 za2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 za",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy03",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sx1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 su2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ze",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t14",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(13)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(12.05)",
         },
         {
            model: "ios 12.2 da3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(12)",
         },
         {
            model: "ios 12.2 yz2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yx1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yv",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 yp1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 t2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 bc3c",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 da2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 pi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(1.1)",
         },
         {
            model: "ios 12.2 xs1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 dx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2(1)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 12.1yj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ye",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1yb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ya",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1xx",
         },
         {
            model: "ios 12.1xw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1xv",
         },
         {
            model: "ios 12.1xu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1x",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1m",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ez",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ey",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ex",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ew",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ev",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1eu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1eo",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ec",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1eb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ea",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1e",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1dc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1db",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1da",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1cx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1az",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ay",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1ax",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.10s",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ex3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(9)",
         },
         {
            model: "ios 12.1 ex4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e18",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e16",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e15",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 aa1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(8)",
         },
         {
            model: "ios 12.1 ey3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 da3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 da2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 cx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(7)",
         },
         {
            model: "ios 12.1 ec3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ez2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ez1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2c",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(6)",
         },
         {
            model: "ios 12.1 yi1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yh3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yd6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yd2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yb5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 yb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ya2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ya",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xy6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv5",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv4",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv3",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(5)xv",
         },
         {
            model: "ios 12.1 xu1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xs2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xr2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xg5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t9",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t15",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t12",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 da1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xz7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1e",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(4)",
         },
         {
            model: "ios 12.1 xi8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t7",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xt3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xp4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(22)",
         },
         {
            model: "ios 12.1 ew2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 eo",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ec2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(20)",
         },
         {
            model: "ios 12.1 xf5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xf4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 t1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 fc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(19)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(18.4)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(18)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(16)",
         },
         {
            model: "ios 12.1 bc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e10",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ex2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ea1c",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e13",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ay",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(13)",
         },
         {
            model: "ios 12.1 ev01",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(11)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(1)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios 12.0xw",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0xv",
         },
         {
            model: "ios 12.0xu",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xq",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xk",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xj",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xi",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xh",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xg",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xe",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xd",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xb",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wt",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0wc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0w5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sv",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0st",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sl",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0sc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0s",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0ev",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0dc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0db",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0da",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(9)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(8)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(7)xv",
         },
         {
            model: "ios 12.0 xk3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xf1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wx5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 t3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 dc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 db2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 e",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 yb4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xs?",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xn1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xn",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wx",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc3b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc2b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 wc 2900xl-lre",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 t1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xm1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xm",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 xe1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(3.2)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(3)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(28)",
         },
         {
            model: "ios 12.0 sv2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sv1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sv",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(27)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(26)",
         },
         {
            model: "ios 12.0 sz",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sy",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s4a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sp",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sp1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s2a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl9",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 sl2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(17)",
         },
         {
            model: "ios 12.0 sc3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s8a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s10",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 st3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(14)",
         },
         {
            model: "ios 12.0 wt6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(12)",
         },
         {
            model: "ios 12.0 st4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.0 s3b",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0(10)",
         },
         {
            model: "ios 12.0 wc9",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "ios 11.3xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3wa4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3t",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3na",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3ma",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3ha",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3db",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3da",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 t1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 db2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 db1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.3 t2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.3",
         },
         {
            model: "ios 11.2xa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2wa4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2wa3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2sa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2p",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2gs",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2f",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2bc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 sa6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 xaf",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(4)",
         },
         {
            model: "ios 11.2 p5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 p2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 bc1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 gs6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.2 gs0.2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(18)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(17)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(16)",
         },
         {
            model: "ios 11.2 t2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2(11)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "ios 11.1ia",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1ct",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1cc",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1ca",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1aa",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(5)",
         },
         {
            model: "ios 11.1 cc4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 cc2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ca4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ca2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ia",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 11.1 ct",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(24)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(22)",
         },
         {
            model: "ios 11.1 aa4",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(18)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(17)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(16)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(14)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(12)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1(11)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.1",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0x",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0(18)",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.0",
         },
         {
            model: "ios",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "10.3",
         },
         {
            model: "catos ea1c",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "catos wc8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "12.0",
         },
         {
            model: "catos sa6",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "11.2",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.2",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4(0.63)",
         },
         {
            model: "catos clr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.4",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.3",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.2(0.65)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.1(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(9)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(8)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(9)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8.3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(8)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5.10)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)x",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(10)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.3(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "6.1(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.6",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(9)",
         },
         {
            model: "catos cv",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(8)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(20)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(19)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(18)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(17)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16.2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(16)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(15)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(14)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13.5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(13)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(12)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(11)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(10)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.5(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(2)",
         },
         {
            model: "catos deferred",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)-",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "5.1(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(9)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(8)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(14)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(13)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(12)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(11)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(10)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.5(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.3",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "4.1(1)",
         },
         {
            model: "catos gdr",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(8)-",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.1(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.4(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.3(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.2(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(9)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(8)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(7)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(5)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(4)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(2)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(12)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(11)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(10)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "2.1(1)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "3.0(7)",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "12948",
         },
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\(rel\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.c:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:vpn_3030_concentator:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:vpn_3060_concentrator:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\(rel\\):*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.3:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3005_concentrator_software:4.0.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:vpn_3080_concentrator:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.a:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:vpn_3015_concentrator:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:cisco:vpn_3020_concentrator:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.d:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                           {
                              cpe23Uri: "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.f:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:cisco:vpn_3002_hardware_client:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this vulnerability.",
      sources: [
         {
            db: "BID",
            id: "12948",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
      trust: 0.9,
   },
   cve: "CVE-2005-0943",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-12152",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2005-0943",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200503-157",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-12152",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-12152",
         },
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and earlier allows remote attackers to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet. Cisco VPN 3000 Concentrator products are reported prone to a remote denial of service vulnerability. \nA remote unauthenticated attacker may trigger this vulnerability to cause an affected device to reload or drop connections.  Specifically, an attacker can target the HTTPS service running on a vulnerable device to trigger this vulnerability. \nCisco VPN 3000 Concentrator products running software version 4.1.7.A and prior are affected by this issue",
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            db: "BID",
            id: "12948",
         },
         {
            db: "VULHUB",
            id: "VHN-12152",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2005-0943",
            trust: 2,
         },
         {
            db: "BID",
            id: "12948",
            trust: 2,
         },
         {
            db: "SECUNIA",
            id: "14784",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "19903",
            trust: 0.6,
         },
         {
            db: "XF",
            id: "3000",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20050330 CISCO VPN 3000 CONCENTRATOR VULNERABLE TO CRAFTED SSL ATTACK",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-12152",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-12152",
         },
         {
            db: "BID",
            id: "12948",
         },
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   id: "VAR-200503-0138",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-12152",
         },
      ],
      trust: 0.9034928233333334,
   },
   last_update_date: "2023-12-18T12:24:36.639000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20050330-vpn3k.shtml",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/12948",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/14784",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/19903",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/19903",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-12152",
         },
         {
            db: "BID",
            id: "12948",
         },
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-12152",
         },
         {
            db: "BID",
            id: "12948",
         },
         {
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2005-03-30T00:00:00",
            db: "VULHUB",
            id: "VHN-12152",
         },
         {
            date: "2005-03-30T00:00:00",
            db: "BID",
            id: "12948",
         },
         {
            date: "2005-03-30T05:00:00",
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            date: "2005-03-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-10-30T00:00:00",
            db: "VULHUB",
            id: "VHN-12152",
         },
         {
            date: "2015-03-19T09:34:00",
            db: "BID",
            id: "12948",
         },
         {
            date: "2018-10-30T16:26:19.357000",
            db: "NVD",
            id: "CVE-2005-0943",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco VPN 3000 C Denial of service attack vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "lack of information",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200503-157",
         },
      ],
      trust: 0.6,
   },
}

var-200401-0042
Vulnerability from variot

Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200401-0042",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.1.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(1\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catalyst 6500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.5\\(1\\)",
         },
         {
            model: "catalyst 6500",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "88192",
         },
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Unknown",
      sources: [
         {
            db: "BID",
            id: "88192",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2003-1001",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-7826",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2003-1001",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200401-017",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-7826",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7826",
         },
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication",
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            db: "BID",
            id: "88192",
         },
         {
            db: "VULHUB",
            id: "VHN-7826",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2003-1001",
            trust: 2,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20031215 CISCO FWSM VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "88192",
            trust: 0.3,
         },
         {
            db: "VULHUB",
            id: "VHN-7826",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7826",
         },
         {
            db: "BID",
            id: "88192",
         },
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   id: "VAR-200401-0042",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7826",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T12:24:36.606000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7826",
         },
         {
            db: "BID",
            id: "88192",
         },
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-7826",
         },
         {
            db: "BID",
            id: "88192",
         },
         {
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-01-05T00:00:00",
            db: "VULHUB",
            id: "VHN-7826",
         },
         {
            date: "2004-01-05T00:00:00",
            db: "BID",
            id: "88192",
         },
         {
            date: "2004-01-05T05:00:00",
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            date: "2004-01-05T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-09-10T00:00:00",
            db: "VULHUB",
            id: "VHN-7826",
         },
         {
            date: "2016-07-06T14:33:00",
            db: "BID",
            id: "88192",
         },
         {
            date: "2008-09-10T19:21:24.353000",
            db: "NVD",
            id: "CVE-2003-1001",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst 6500 and 7600 Buffer overflow vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-017",
         },
      ],
      trust: 0.6,
   },
}

var-200703-0084
Vulnerability from variot

The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address. According to Cisco Systems information NAM Model number WS-SVC-NAM-1, WS-SVC-NAM-2, WS-X6380-NAM Will be affected. For details, check the information provided by the vendor.Crafted by a third party SNMP Arbitrary commands may be executed due to packet processing. According to Cisco Systems information, the device may be completely controlled. An attacker can leverage this issue to gain complete control of the affected device. NAM uses the Simple Network Management Protocol (SNMP) to communicate with the Catalyst system.


Want a new job? http://secunia.com/secunia_vacancies/

Secunia is looking for new researchers with a reversing background and experience in writing exploit code: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ http://secunia.com/Disassembling_og_Reversing/


TITLE: Cisco Products NAM SNMP Spoofing Vulnerability

SECUNIA ADVISORY ID: SA24344

VERIFY ADVISORY: http://secunia.com/advisories/24344/

CRITICAL: Moderately critical

IMPACT: System access

WHERE:

From local network

OPERATING SYSTEM: Cisco IOS R12.x http://secunia.com/product/50/ Cisco IOS 12.x http://secunia.com/product/182/ Cisco CATOS 8.x http://secunia.com/product/3564/ Cisco CATOS 7.x http://secunia.com/product/185/

SOFTWARE: Cisco Catalyst 6500 Series Network Analysis Module (NAM-1/NAM-2) http://secunia.com/product/2272/ Cisco Catalyst 6500 Series Network Analysis Module (First Generation) http://secunia.com/product/2271/

DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to compromise a vulnerable system.

SOLUTION: Update to a fixed version (see vendor advisory for details). http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0084",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6000 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6000 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "network analysis module",
            scope: null,
            trust: 1.4,
            vendor: "cisco",
            version: null,
         },
         {
            model: "network analysis module",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "7600 series",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 6000 series",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catalyst 6500 series",
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 ex",
            scope: "ne",
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2za",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sy",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxf",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxe",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxd",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sxa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sx",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sgb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sga",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2sg",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2s",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixb",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ixa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ewa",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2ew",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2eu",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios zu",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.2",
         },
         {
            model: "ios 12.1ex",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1e",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(4)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(3)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(2)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(1)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(18)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(17)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(16)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(15)",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "60000",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7600",
         },
         {
            model: "ios 12.2 sra2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sga1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sg1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 zu1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxf5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxe6a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 sxd7a",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s5",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 ixb2",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.2 s3",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e1",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios 12.1 e8",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(6)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "8.5(5.3)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(20)",
         },
         {
            model: "catos",
            scope: "ne",
            trust: 0.3,
            vendor: "cisco",
            version: "7.6(19.2)",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            db: "BID",
            id: "22751",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:network_analysis_module:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6000_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Security bulletin",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2007-1257",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: true,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2007-1257",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "VHN-24619",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2007-1257",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#472412",
                  trust: 0.8,
                  value: "9.37",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200703-133",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-24619",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The Network Analysis Module (NAM) in Cisco Catalyst Series 6000, 6500, and 7600 allows remote attackers to execute arbitrary commands via certain SNMP packets that are spoofed from the NAM's own IP address. According to Cisco Systems information NAM Model number WS-SVC-NAM-1, WS-SVC-NAM-2, WS-X6380-NAM Will be affected. For details, check the information provided by the vendor.Crafted by a third party SNMP Arbitrary commands may be executed due to packet processing. According to Cisco Systems information, the device may be completely controlled. \nAn attacker can leverage this issue to gain complete control of the affected device. NAM uses the Simple Network Management Protocol (SNMP) to communicate with the Catalyst system. \n\n----------------------------------------------------------------------\n\nWant a new job?\nhttp://secunia.com/secunia_vacancies/\n\nSecunia is looking for new researchers with a reversing background\nand experience in writing exploit code:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\nhttp://secunia.com/Disassembling_og_Reversing/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Products NAM SNMP Spoofing Vulnerability\n\nSECUNIA ADVISORY ID:\nSA24344\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24344/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n>From local network\n\nOPERATING SYSTEM:\nCisco IOS R12.x\nhttp://secunia.com/product/50/\nCisco IOS 12.x\nhttp://secunia.com/product/182/\nCisco CATOS 8.x\nhttp://secunia.com/product/3564/\nCisco CATOS 7.x\nhttp://secunia.com/product/185/\n\nSOFTWARE:\nCisco Catalyst 6500 Series Network Analysis Module (NAM-1/NAM-2)\nhttp://secunia.com/product/2272/\nCisco Catalyst 6500 Series Network Analysis Module (First Generation)\nhttp://secunia.com/product/2271/\n\nDESCRIPTION:\nA vulnerability has been reported in various Cisco products, which\ncan be exploited by malicious people to compromise a vulnerable\nsystem. \n\nSOLUTION:\nUpdate to a fixed version (see vendor advisory for details). \nhttp://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "BID",
            id: "22751",
         },
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            db: "PACKETSTORM",
            id: "54746",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#472412",
            trust: 3.6,
         },
         {
            db: "BID",
            id: "22751",
            trust: 2.8,
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
            trust: 2.8,
         },
         {
            db: "SECUNIA",
            id: "24344",
            trust: 2.6,
         },
         {
            db: "SECTRACK",
            id: "1017710",
            trust: 2.5,
         },
         {
            db: "OSVDB",
            id: "33066",
            trust: 1.7,
         },
         {
            db: "VUPEN",
            id: "ADV-2007-0783",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "32750",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20070228 CISCO CATALYST 6000, 6500 SERIES AND CISCO 7600 SERIES NAM (NETWORK ANALYSIS MODULE) VULNERABILITY",
            trust: 0.6,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:5188",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-24619",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "54746",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            db: "BID",
            id: "22751",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "PACKETSTORM",
            id: "54746",
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   id: "VAR-200703-0084",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T12:39:53.932000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sa-20070228-nam",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.9,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20070228-nam.shtml",
         },
         {
            trust: 2.8,
            url: "http://www.kb.cert.org/vuls/id/472412",
         },
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/22751",
         },
         {
            trust: 1.7,
            url: "http://osvdb.org/33066",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id?1017710",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/24344",
         },
         {
            trust: 1.1,
            url: "http://www.cisco.com/en/us/products/hw/switches/ps708/products_module_configuration_guide_chapter09186a0080394e09.html",
         },
         {
            trust: 1.1,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5188",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2007/0783",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/32750",
         },
         {
            trust: 0.9,
            url: "http://secunia.com/advisories/24344/",
         },
         {
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-air-20070228-nam.shtml",
         },
         {
            trust: 0.8,
            url: "http://securitytracker.com/alerts/2007/feb/1017710.html",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1257",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-1257",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/32750",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2007/0783",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5188",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/3564/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/disassembling_og_reversing/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2271/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/secunia_vacancies/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/hardcore_disassembler_and_reverse_engineer/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/2272/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/182/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/185/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            db: "BID",
            id: "22751",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "PACKETSTORM",
            id: "54746",
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            db: "BID",
            id: "22751",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            db: "PACKETSTORM",
            id: "54746",
         },
         {
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2007-03-02T00:00:00",
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            date: "2007-03-03T00:00:00",
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            date: "2007-02-28T00:00:00",
            db: "BID",
            id: "22751",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            date: "2007-03-05T23:12:53",
            db: "PACKETSTORM",
            id: "54746",
         },
         {
            date: "2007-03-03T20:19:00",
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            date: "2007-02-28T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2007-03-22T00:00:00",
            db: "CERT/CC",
            id: "VU#472412",
         },
         {
            date: "2017-10-11T00:00:00",
            db: "VULHUB",
            id: "VHN-24619",
         },
         {
            date: "2015-05-12T19:34:00",
            db: "BID",
            id: "22751",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2007-000183",
         },
         {
            date: "2017-10-11T01:31:48.097000",
            db: "NVD",
            id: "CVE-2007-1257",
         },
         {
            date: "2009-03-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Catalyst Systems with a NAM may allow system access via spoofing the SNMP communication",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#472412",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200703-133",
         },
      ],
      trust: 0.6,
   },
}

var-200609-0180
Vulnerability from variot

Heap-based buffer overflow in the VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to execute arbitrary code via a long VLAN name in a VTP type 2 summary advertisement. Cisco IOS fails to properly verify the VTP configuration revision number. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Cisco IOS Is VLAN Trunk protocol (VTP) There are several security issues in the implementation of: 1) VTP Included in packet VTP There is a flaw in the processing of the version field, so if an inappropriate value is set, the processing will go into a loop and the device will be reset. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. Cisco IOS is prone to multiple vulnerabilities when handling VLAN Trunking Protocol (VTP) packets. These issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. Attackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. By exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. Cisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name.


Want to work within IT-Security?

Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.

Currently the following type of positions are available: http://secunia.com/quality_assurance_analyst/ http://secunia.com/web_application_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/


TITLE: Cisco IOS VTP Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA21896

VERIFY ADVISORY: http://secunia.com/advisories/21896/

CRITICAL: Moderately critical

IMPACT: Manipulation of data, DoS, System access

WHERE:

From local network

OPERATING SYSTEM: Cisco IOS 10.x http://secunia.com/product/184/ Cisco IOS 11.x http://secunia.com/product/183/ Cisco IOS 12.x http://secunia.com/product/182/ Cisco IOS R11.x http://secunia.com/product/53/ Cisco IOS R12.x http://secunia.com/product/50/

DESCRIPTION: FX has reported some vulnerabilities in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable network device. This can be exploited to reset the switch with a Software Forced Crash Exception by sending a specially crafted packet to a trunk enabled port.

2) An integer overflow error exists in the VTP configuration revision handling.

3) A boundary error exists in the processing of VTP summary advertisement messages. This can be exploited to cause a heap-based buffer overflow by sending a specially crafted message containing an overly long VLAN name (more than 100 characters) to a trunk enabled port.

NOTE: The packets must be received with a matching domain name and a matching VTP domain password (if configured).

SOLUTION: A fix is reportedly available for vulnerability #1. The vendor also recommends applying a VTP domain password to the VTP domain (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: FX, Phenoelit.

ORIGINAL ADVISORY: Phenoelit: http://www.phenoelit.de/stuff/CiscoVTP.txt

Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200609-0180",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: null,
            scope: null,
            trust: 1.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "ios",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "12.1\\(19\\)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.8,
            vendor: "cisco",
            version: "12.1",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "12.1(19)",
         },
         {
            model: "ios",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "0",
         },
         {
            model: "catos",
            scope: null,
            trust: 0.3,
            vendor: "cisco",
            version: null,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "FX fx@phenoelit.de",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2006-4776",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: true,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 7.5,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2006-4776",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 7.5,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 10,
                  id: "VHN-20884",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2006-4776",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#542108",
                  trust: 0.8,
                  value: "22.74",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#175148",
                  trust: 0.8,
                  value: "3.37",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200609-213",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-20884",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Heap-based buffer overflow in the VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) allows remote attackers to execute arbitrary code via a long VLAN name in a VTP type 2 summary advertisement. Cisco IOS fails to properly verify the VTP configuration revision number. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Cisco IOS Is VLAN Trunk protocol (VTP) There are several security issues in the implementation of: 1) VTP Included in packet VTP There is a flaw in the processing of the version field, so if an inappropriate value is set, the processing will go into a loop and the device will be reset. (CVE-2006-4774) If exploited by a remote attacker, the device could go into a denial of service. 2) Since there is a flaw that the setting revision number is processed as a negative integer, VLAN There is a problem that changes in configuration information are not properly reflected. (CVE-2006-4775) If exploited by a remote attacker, VLAN Changing the setting information may be hindered. 3) VLAN There is a flaw in checking the length of the name, 100 There is a problem where heap overflow occurs when processing names longer than letters. (CVE-2006-4776) If exploited by a remote attacker, the device could go into a denial of service or potentially execute arbitrary code.Please refer to the “Overview” for the impact of this vulnerability. Cisco IOS is prone to multiple vulnerabilities when handling VLAN Trunking Protocol (VTP) packets. \nThese issues include two denial-of-service vulnerabilities and a buffer-overflow vulnerability. \nAttackers require access to trunk ports on affected devices for VTP packets to be accepted. Attackers may reportedly use the Dynamic Trunk Protocol (DTP) to become a trunking peer to gain required access. \nBy exploiting these issues, attackers may crash affected routers, cause further VTP packets to be ignored, or potentially execute arbitrary machine code in the context of affected devices. \nCisco IOS 12.1(19) is vulnerable to these issues; other versions are also likely affected. 2 VTP Modified Version Integer Wrapping If an attacker can send VTP updates (digest and sub) to a Cisco IOS or CatOS device, he can choose the modified version number of the VTP message himself. IOS will accept the version number 0x7FFFFFFF. Therefore, this revision number is treated as a large negative value. One field of the VTP record contains the name of the VLAN, and the other field is the length of the name. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/quality_assurance_analyst/\nhttp://secunia.com/web_application_security_specialist/ \nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco IOS VTP Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA21896\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/21896/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nManipulation of data, DoS, System access\n\nWHERE:\n>From local network\n\nOPERATING SYSTEM:\nCisco IOS 10.x\nhttp://secunia.com/product/184/\nCisco IOS 11.x\nhttp://secunia.com/product/183/\nCisco IOS 12.x\nhttp://secunia.com/product/182/\nCisco IOS R11.x\nhttp://secunia.com/product/53/\nCisco IOS R12.x\nhttp://secunia.com/product/50/\n\nDESCRIPTION:\nFX has reported some vulnerabilities in Cisco IOS, which can be\nexploited by malicious people to cause a DoS (Denial of Service) and\npotentially to compromise a vulnerable network device. This can be exploited to reset the switch\nwith a Software Forced Crash Exception by sending a specially crafted\npacket to a trunk enabled port. \n\n2) An integer overflow error exists in the VTP configuration revision\nhandling. \n\n3) A boundary error exists in the processing of VTP summary\nadvertisement messages. This can be exploited to cause a heap-based\nbuffer overflow by sending a specially crafted message containing an\noverly long VLAN name (more than 100 characters) to a trunk enabled\nport. \n\nNOTE: The packets must be received with a matching domain name and a\nmatching VTP domain password (if configured). \n\nSOLUTION:\nA fix is reportedly available for vulnerability #1. The vendor also\nrecommends applying a VTP domain password to the VTP domain (see the\nvendor's advisory for details). \n\nPROVIDED AND/OR DISCOVERED BY:\nFX, Phenoelit. \n\nORIGINAL ADVISORY:\nPhenoelit:\nhttp://www.phenoelit.de/stuff/CiscoVTP.txt\n\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
      ],
      trust: 3.6,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SECUNIA",
            id: "21896",
            trust: 3.4,
         },
         {
            db: "CERT/CC",
            id: "VU#542108",
            trust: 3.3,
         },
         {
            db: "BID",
            id: "19998",
            trust: 2.8,
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
            trust: 2.5,
         },
         {
            db: "OSVDB",
            id: "28777",
            trust: 1.7,
         },
         {
            db: "VUPEN",
            id: "ADV-2006-3601",
            trust: 1.7,
         },
         {
            db: "VUPEN",
            id: "ADV-2006-3600",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1016843",
            trust: 1.7,
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
            trust: 1.6,
         },
         {
            db: "SECUNIA",
            id: "21902",
            trust: 0.9,
         },
         {
            db: "CERT/CC",
            id: "VU#821420",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
            trust: 0.7,
         },
         {
            db: "XF",
            id: "28927",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20060913 RE: CISCO IOS VTP ISSUES",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20060913 CISCO IOS VTP ISSUES",
            trust: 0.6,
         },
         {
            db: "CISCO",
            id: "20060913 CISCO VLAN TRUNKING PROTOCOL VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-20884",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "50047",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "50048",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   id: "VAR-200609-0180",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2023-12-18T13:10:33.077000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "cisco-sr-20060913-vtp",
            trust: 0.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.8,
            url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
         },
         {
            trust: 2.5,
            url: "http://www.securityfocus.com/bid/19998",
         },
         {
            trust: 2.5,
            url: "http://www.kb.cert.org/vuls/id/542108",
         },
         {
            trust: 1.8,
            url: "http://secunia.com/advisories/21896/",
         },
         {
            trust: 1.8,
            url: "http://www.phenoelit.de/stuff/ciscovtp.txt",
         },
         {
            trust: 1.7,
            url: "http://www.osvdb.org/28777",
         },
         {
            trust: 1.7,
            url: "http://securitytracker.com/id?1016843",
         },
         {
            trust: 1.7,
            url: "http://secunia.com/advisories/21896",
         },
         {
            trust: 1.6,
            url: "http://www.phenoelit.de/stuff/ciscovtp.txt ",
         },
         {
            trust: 1.6,
            url: "http://www.cisco.com/en/us/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008014870f.shtml#wp998892",
         },
         {
            trust: 1.4,
            url: "http://www.frsirt.com/english/advisories/2006/3600",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2006/3600",
         },
         {
            trust: 1.1,
            url: "http://www.vupen.com/english/advisories/2006/3601",
         },
         {
            trust: 1.1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28927",
         },
         {
            trust: 0.9,
            url: "http://secunia.com/advisories/21902/",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-4776",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-4776",
         },
         {
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/821420",
         },
         {
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/175148",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/445938/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/445896/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/28927",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2006/3601",
         },
         {
            trust: 0.3,
            url: "http://www.cisco.com/public/sw-center/sw-ios.shtml",
         },
         {
            trust: 0.3,
            url: "/archive/1/445896",
         },
         {
            trust: 0.3,
            url: "/archive/1/445938",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/secunia_security_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/about_secunia_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/quality_assurance_analyst/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/hardcore_disassembler_and_reverse_engineer/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/web_application_security_specialist/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/50/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/184/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/53/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/182/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/183/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/527/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/3564/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/185/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/product/526/",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            db: "BID",
            id: "19998",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            date: "2006-09-14T00:00:00",
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            date: "2006-09-13T00:00:00",
            db: "BID",
            id: "19998",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            date: "2006-09-14T22:28:53",
            db: "PACKETSTORM",
            id: "50047",
         },
         {
            date: "2006-09-14T22:28:53",
            db: "PACKETSTORM",
            id: "50048",
         },
         {
            date: "2006-09-14T00:07:00",
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            date: "2006-09-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#542108",
         },
         {
            date: "2006-09-27T00:00:00",
            db: "CERT/CC",
            id: "VU#175148",
         },
         {
            date: "2018-10-17T00:00:00",
            db: "VULHUB",
            id: "VHN-20884",
         },
         {
            date: "2006-09-14T18:47:00",
            db: "BID",
            id: "19998",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2006-000553",
         },
         {
            date: "2018-10-17T21:39:31.857000",
            db: "NVD",
            id: "CVE-2006-4776",
         },
         {
            date: "2006-09-18T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco IOS contains buffer overflow in VTP VLAN name handling",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#542108",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer overflow",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200609-213",
         },
      ],
      trust: 0.6,
   },
}

var-200401-0043
Vulnerability from variot

Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set. CSCeb16356 (HTTP Auth) Vulnerability: Passing HTTP Auth requests using TACACS+ or RADIUS authentication can cause Cisco FWSM to crash and reload due to send buffer overflow. This request can be initiated by the user by initiating an FTP, TELNET or HTTP connection. Cisco FWSM will only allow communication if the username and password are authenticated by the specified ACACS+ or RADIUS server. CSCeb88419 (SNMPv3) Vulnerability When configuring snmp-server host or snmp-server host poll on the Cisco FWSM module, when processing the received SNMPv3 message, the Cisco FWSM may crash and generate a rejection Serve. This vulnerability is not affected only when the snmp-server host trap command is configured on the Cisco FWSM module

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200401-0043",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 6500 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "catalyst 6500 ws-x6380-nam",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-1",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1.6,
            vendor: "cisco",
            version: "2.2\\(1a\\)",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1.3,
            vendor: "cisco",
            version: "1.1.2",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.6\\(1\\)",
         },
         {
            model: "catalyst 7600 ws-svc-nam-2",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "5.4\\(1\\)",
         },
         {
            model: "catalyst 6500",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "firewall services module",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "*",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "2.1\\(2\\)",
         },
         {
            model: "catalyst 7600 ws-x6380-nam",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "3.1\\(1a\\)",
         },
         {
            model: "catos",
            scope: "eq",
            trust: 1,
            vendor: "cisco",
            version: "7.5\\(1\\)",
         },
         {
            model: "catalyst 6500",
            scope: null,
            trust: 0.6,
            vendor: "cisco",
            version: null,
         },
         {
            model: "catos",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "7.5(1)",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-svc-nam-2",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76003.1",
         },
         {
            model: "catalyst ws-x6380-nam",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "76002.1",
         },
         {
            model: "catalyst ws-svc-nam-1",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "65002.2",
         },
         {
            model: "catalyst",
            scope: "eq",
            trust: 0.3,
            vendor: "cisco",
            version: "6500",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "88263",
         },
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:1.1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.5\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:7.6\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-1:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:2.2\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_7600_ws-x6380-nam:2.1\\(2\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-svc-nam-2:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:catalyst_6500_ws-x6380-nam:3.1\\(1a\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Security bulletin",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2003-1002",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-7827",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2003-1002",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200401-024",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-7827",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7827",
         },
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set. CSCeb16356 (HTTP Auth) Vulnerability: Passing HTTP Auth requests using TACACS+ or RADIUS authentication can cause Cisco FWSM to crash and reload due to send buffer overflow. This request can be initiated by the user by initiating an FTP, TELNET or HTTP connection. Cisco FWSM will only allow communication if the username and password are authenticated by the specified ACACS+ or RADIUS server. CSCeb88419 (SNMPv3) Vulnerability When configuring snmp-server host <if_name> <ip_addr> or snmp-server host <if_name> <ip_addr> poll on the Cisco FWSM module, when processing the received SNMPv3 message, the Cisco FWSM may crash and generate a rejection Serve. This vulnerability is not affected only when the snmp-server host <if_name> <ip_addr> trap command is configured on the Cisco FWSM module",
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            db: "BID",
            id: "88263",
         },
         {
            db: "VULHUB",
            id: "VHN-7827",
         },
      ],
      trust: 1.26,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2003-1002",
            trust: 2,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
            trust: 0.7,
         },
         {
            db: "CISCO",
            id: "20031215 CISCO FWSM VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "BID",
            id: "88263",
            trust: 0.3,
         },
         {
            db: "VULHUB",
            id: "VHN-7827",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7827",
         },
         {
            db: "BID",
            id: "88263",
         },
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   id: "VAR-200401-0043",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7827",
         },
      ],
      trust: 0.4056849,
   },
   last_update_date: "2023-12-18T12:24:36.582000Z",
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2,
            url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7827",
         },
         {
            db: "BID",
            id: "88263",
         },
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-7827",
         },
         {
            db: "BID",
            id: "88263",
         },
         {
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2004-01-05T00:00:00",
            db: "VULHUB",
            id: "VHN-7827",
         },
         {
            date: "2004-01-05T00:00:00",
            db: "BID",
            id: "88263",
         },
         {
            date: "2004-01-05T05:00:00",
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            date: "2003-12-15T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2008-09-10T00:00:00",
            db: "VULHUB",
            id: "VHN-7827",
         },
         {
            date: "2016-07-06T14:33:00",
            db: "BID",
            id: "88263",
         },
         {
            date: "2008-09-10T19:21:24.413000",
            db: "NVD",
            id: "CVE-2003-1002",
         },
         {
            date: "2005-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Cisco FWSM Multiple security vulnerabilities",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "unknown",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200401-024",
         },
      ],
      trust: 0.6,
   },
}

CVE-2006-4775 (GCVE-0-2006-4775)
Vulnerability from cvelistv5
Published
2006-09-14 00:00
Modified
2024-08-07 19:23
Severity ?
Summary
The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.
References
http://www.phenoelit.de/stuff/CiscoVTP.txtx_refsource_MISC
http://secunia.com/advisories/21896third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/19998vdb-entry, x_refsource_BID
http://www.osvdb.org/28776vdb-entry, x_refsource_OSVDB
http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtmlvendor-advisory, x_refsource_CISCO
http://securitytracker.com/id?1016843vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/archive/1/445938/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2006/3600vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/28925vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/175148third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/archive/1/445896/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/21902third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T19:23:40.975Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.phenoelit.de/stuff/CiscoVTP.txt",
               },
               {
                  name: "21896",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21896",
               },
               {
                  name: "19998",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/19998",
               },
               {
                  name: "28776",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/28776",
               },
               {
                  name: "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
               },
               {
                  name: "1016843",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1016843",
               },
               {
                  name: "20060913 Re: Cisco IOS VTP issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
               },
               {
                  name: "ADV-2006-3600",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2006/3600",
               },
               {
                  name: "cisco-ios-vtp-wrap-config-manipulation(28925)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925",
               },
               {
                  name: "VU#175148",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/175148",
               },
               {
                  name: "20060913 Cisco IOS VTP issues",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
               },
               {
                  name: "21902",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/21902",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2006-09-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-17T20:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.phenoelit.de/stuff/CiscoVTP.txt",
            },
            {
               name: "21896",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21896",
            },
            {
               name: "19998",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/19998",
            },
            {
               name: "28776",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/28776",
            },
            {
               name: "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
            },
            {
               name: "1016843",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1016843",
            },
            {
               name: "20060913 Re: Cisco IOS VTP issues",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
            },
            {
               name: "ADV-2006-3600",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2006/3600",
            },
            {
               name: "cisco-ios-vtp-wrap-config-manipulation(28925)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925",
            },
            {
               name: "VU#175148",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/175148",
            },
            {
               name: "20060913 Cisco IOS VTP issues",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
            },
            {
               name: "21902",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/21902",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2006-4775",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The VLAN Trunking Protocol (VTP) feature in Cisco IOS 12.1(19) and CatOS allows remote attackers to cause a denial of service by sending a VTP update with a revision value of 0x7FFFFFFF, which is incremented to 0x80000000 and is interpreted as a negative number in a signed context.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.phenoelit.de/stuff/CiscoVTP.txt",
                     refsource: "MISC",
                     url: "http://www.phenoelit.de/stuff/CiscoVTP.txt",
                  },
                  {
                     name: "21896",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21896",
                  },
                  {
                     name: "19998",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/19998",
                  },
                  {
                     name: "28776",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/28776",
                  },
                  {
                     name: "20060913 Cisco VLAN Trunking Protocol Vulnerabilities",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sr-20060913-vtp.shtml",
                  },
                  {
                     name: "1016843",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1016843",
                  },
                  {
                     name: "20060913 Re: Cisco IOS VTP issues",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/445938/100/0/threaded",
                  },
                  {
                     name: "ADV-2006-3600",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2006/3600",
                  },
                  {
                     name: "cisco-ios-vtp-wrap-config-manipulation(28925)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/28925",
                  },
                  {
                     name: "VU#175148",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/175148",
                  },
                  {
                     name: "20060913 Cisco IOS VTP issues",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/445896/100/0/threaded",
                  },
                  {
                     name: "21902",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/21902",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2006-4775",
      datePublished: "2006-09-14T00:00:00",
      dateReserved: "2006-09-13T00:00:00",
      dateUpdated: "2024-08-07T19:23:40.975Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2008-0960 (GCVE-0-2008-0960)
Vulnerability from cvelistv5
Published
2008-06-10 18:00
Modified
2024-08-07 08:01
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380x_refsource_CONFIRM
http://secunia.com/advisories/35463third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30615third-party-advisory, x_refsource_SECUNIA
http://support.apple.com/kb/HT2163x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/1787/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/30648third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/CTAR-7FBS8Qx_refsource_CONFIRM
http://secunia.com/advisories/32664third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1981/referencesvdb-entry, x_refsource_VUPEN
http://www.vupen.com/english/advisories/2008/1801/referencesvdb-entry, x_refsource_VUPEN
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.htmlvendor-advisory, x_refsource_SUSE
http://lists.ingate.com/pipermail/productinfo/2008/000021.htmlmailing-list, x_refsource_MLIST
http://secunia.com/advisories/31351third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/1788/referencesvdb-entry, x_refsource_VUPEN
http://support.avaya.com/elmodocs2/security/ASA-2008-282.htmx_refsource_CONFIRM
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/29623vdb-entry, x_refsource_BID
http://secunia.com/advisories/31334third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2971vdb-entry, x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820vdb-entry, signature, x_refsource_OVAL
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414vdb-entry, signature, x_refsource_OVAL
http://secunia.com/advisories/30626third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=127730470825399&w=2vendor-advisory, x_refsource_HP
http://www.vmware.com/security/advisories/VMSA-2008-0017.htmlx_refsource_MISC
http://www.openwall.com/lists/oss-security/2008/06/09/1mailing-list, x_refsource_MLIST
http://marc.info/?l=bugtraq&m=127730470825399&w=2vendor-advisory, x_refsource_HP
http://www.kb.cert.org/vuls/id/878044third-party-advisory, x_refsource_CERT-VN
http://secunia.com/advisories/30647third-party-advisory, x_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1vendor-advisory, x_refsource_SUNALERT
http://www.securityfocus.com/archive/1/497962/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/1836/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/33003third-party-advisory, x_refsource_SECUNIA
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtmlvendor-advisory, x_refsource_CISCO
http://www.vupen.com/english/advisories/2008/2361vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/31568third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/31467third-party-advisory, x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.htmlvendor-advisory, x_refsource_APPLE
http://www.debian.org/security/2008/dsa-1663vendor-advisory, x_refsource_DEBIAN
http://www.us-cert.gov/cas/techalerts/TA08-162A.htmlthird-party-advisory, x_refsource_CERT
http://www.kb.cert.org/vuls/id/MIMG-7ETS87x_refsource_CONFIRM
http://www.ocert.org/advisories/ocert-2008-006.htmlx_refsource_MISC
http://rhn.redhat.com/errata/RHSA-2008-0528.htmlvendor-advisory, x_refsource_REDHAT
http://securityreason.com/securityalert/3933third-party-advisory, x_refsource_SREASON
http://www.redhat.com/support/errata/RHSA-2008-0529.htmlvendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/30612third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30802third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=447974x_refsource_CONFIRM
http://www.vmware.com/security/advisories/VMSA-2008-0013.htmlx_refsource_CONFIRM
http://www.kb.cert.org/vuls/id/MIMG-7ETS5Zx_refsource_CONFIRM
https://www.exploit-db.com/exploits/5790exploit, x_refsource_EXPLOIT-DB
http://www.vupen.com/english/advisories/2008/1797/referencesvdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-200808-02.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/archive/1/493218/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/30665third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.htmlvendor-advisory, x_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.htmlvendor-advisory, x_refsource_FEDORA
http://www.vupen.com/english/advisories/2008/1800/referencesvdb-entry, x_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=MDVSA-2008:118vendor-advisory, x_refsource_MANDRIVA
http://www.ubuntu.com/usn/usn-685-1vendor-advisory, x_refsource_UBUNTU
http://sourceforge.net/forum/forum.php?forum_id=833770x_refsource_CONFIRM
http://www.securitytracker.com/id?1020218vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/30596third-party-advisory, x_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785vdb-entry, signature, x_refsource_OVAL
http://www.vupen.com/english/advisories/2009/1612vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/30574third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T08:01:40.150Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
               },
               {
                  name: "35463",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/35463",
               },
               {
                  name: "30615",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30615",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.apple.com/kb/HT2163",
               },
               {
                  name: "ADV-2008-1787",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1787/references",
               },
               {
                  name: "30648",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30648",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
               },
               {
                  name: "32664",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/32664",
               },
               {
                  name: "ADV-2008-1981",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1981/references",
               },
               {
                  name: "ADV-2008-1801",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1801/references",
               },
               {
                  name: "SUSE-SA:2008:039",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html",
               },
               {
                  name: "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://lists.ingate.com/pipermail/productinfo/2008/000021.html",
               },
               {
                  name: "31351",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31351",
               },
               {
                  name: "ADV-2008-1788",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1788/references",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
               },
               {
                  name: "FEDORA-2008-5215",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html",
               },
               {
                  name: "29623",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/29623",
               },
               {
                  name: "31334",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31334",
               },
               {
                  name: "ADV-2008-2971",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/2971",
               },
               {
                  name: "oval:org.mitre.oval:def:10820",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820",
               },
               {
                  name: "oval:org.mitre.oval:def:6414",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414",
               },
               {
                  name: "30626",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30626",
               },
               {
                  name: "SSRT080082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
               },
               {
                  name: "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2008/06/09/1",
               },
               {
                  name: "HPSBMA02439",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
               },
               {
                  name: "VU#878044",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/878044",
               },
               {
                  name: "30647",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30647",
               },
               {
                  name: "238865",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUNALERT",
                     "x_transferred",
                  ],
                  url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1",
               },
               {
                  name: "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/497962/100/0/threaded",
               },
               {
                  name: "ADV-2008-1836",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1836/references",
               },
               {
                  name: "33003",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/33003",
               },
               {
                  name: "20080610 SNMP Version 3 Authentication Vulnerabilities",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
               },
               {
                  name: "ADV-2008-2361",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/2361",
               },
               {
                  name: "31568",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31568",
               },
               {
                  name: "31467",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/31467",
               },
               {
                  name: "APPLE-SA-2008-06-30",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_APPLE",
                     "x_transferred",
                  ],
                  url: "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html",
               },
               {
                  name: "DSA-1663",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2008/dsa-1663",
               },
               {
                  name: "TA08-162A",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.us-cert.gov/cas/techalerts/TA08-162A.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.ocert.org/advisories/ocert-2008-006.html",
               },
               {
                  name: "RHSA-2008:0528",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2008-0528.html",
               },
               {
                  name: "3933",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SREASON",
                     "x_transferred",
                  ],
                  url: "http://securityreason.com/securityalert/3933",
               },
               {
                  name: "RHSA-2008:0529",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2008-0529.html",
               },
               {
                  name: "30612",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30612",
               },
               {
                  name: "30802",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30802",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
               },
               {
                  name: "5790",
                  tags: [
                     "exploit",
                     "x_refsource_EXPLOIT-DB",
                     "x_transferred",
                  ],
                  url: "https://www.exploit-db.com/exploits/5790",
               },
               {
                  name: "ADV-2008-1797",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1797/references",
               },
               {
                  name: "GLSA-200808-02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "http://security.gentoo.org/glsa/glsa-200808-02.xml",
               },
               {
                  name: "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/493218/100/0/threaded",
               },
               {
                  name: "30665",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30665",
               },
               {
                  name: "FEDORA-2008-5218",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html",
               },
               {
                  name: "FEDORA-2008-5224",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html",
               },
               {
                  name: "ADV-2008-1800",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2008/1800/references",
               },
               {
                  name: "MDVSA-2008:118",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRIVA",
                     "x_transferred",
                  ],
                  url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118",
               },
               {
                  name: "USN-685-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/usn-685-1",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/forum/forum.php?forum_id=833770",
               },
               {
                  name: "1020218",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1020218",
               },
               {
                  name: "30596",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30596",
               },
               {
                  name: "oval:org.mitre.oval:def:5785",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785",
               },
               {
                  name: "ADV-2009-1612",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2009/1612",
               },
               {
                  name: "30574",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/30574",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2018-10-15T20:57:01",
            orgId: "37e5125f-f79b-445b-8fad-9564f167944b",
            shortName: "certcc",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
            },
            {
               name: "35463",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/35463",
            },
            {
               name: "30615",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30615",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.apple.com/kb/HT2163",
            },
            {
               name: "ADV-2008-1787",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1787/references",
            },
            {
               name: "30648",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30648",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
            },
            {
               name: "32664",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/32664",
            },
            {
               name: "ADV-2008-1981",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1981/references",
            },
            {
               name: "ADV-2008-1801",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1801/references",
            },
            {
               name: "SUSE-SA:2008:039",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html",
            },
            {
               name: "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://lists.ingate.com/pipermail/productinfo/2008/000021.html",
            },
            {
               name: "31351",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31351",
            },
            {
               name: "ADV-2008-1788",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1788/references",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
            },
            {
               name: "FEDORA-2008-5215",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html",
            },
            {
               name: "29623",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/29623",
            },
            {
               name: "31334",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31334",
            },
            {
               name: "ADV-2008-2971",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/2971",
            },
            {
               name: "oval:org.mitre.oval:def:10820",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820",
            },
            {
               name: "oval:org.mitre.oval:def:6414",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414",
            },
            {
               name: "30626",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30626",
            },
            {
               name: "SSRT080082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
            },
            {
               name: "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2008/06/09/1",
            },
            {
               name: "HPSBMA02439",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
            },
            {
               name: "VU#878044",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/878044",
            },
            {
               name: "30647",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30647",
            },
            {
               name: "238865",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUNALERT",
               ],
               url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1",
            },
            {
               name: "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/497962/100/0/threaded",
            },
            {
               name: "ADV-2008-1836",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1836/references",
            },
            {
               name: "33003",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/33003",
            },
            {
               name: "20080610 SNMP Version 3 Authentication Vulnerabilities",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
            },
            {
               name: "ADV-2008-2361",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/2361",
            },
            {
               name: "31568",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31568",
            },
            {
               name: "31467",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/31467",
            },
            {
               name: "APPLE-SA-2008-06-30",
               tags: [
                  "vendor-advisory",
                  "x_refsource_APPLE",
               ],
               url: "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html",
            },
            {
               name: "DSA-1663",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2008/dsa-1663",
            },
            {
               name: "TA08-162A",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.us-cert.gov/cas/techalerts/TA08-162A.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.ocert.org/advisories/ocert-2008-006.html",
            },
            {
               name: "RHSA-2008:0528",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2008-0528.html",
            },
            {
               name: "3933",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SREASON",
               ],
               url: "http://securityreason.com/securityalert/3933",
            },
            {
               name: "RHSA-2008:0529",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2008-0529.html",
            },
            {
               name: "30612",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30612",
            },
            {
               name: "30802",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30802",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
            },
            {
               name: "5790",
               tags: [
                  "exploit",
                  "x_refsource_EXPLOIT-DB",
               ],
               url: "https://www.exploit-db.com/exploits/5790",
            },
            {
               name: "ADV-2008-1797",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1797/references",
            },
            {
               name: "GLSA-200808-02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "http://security.gentoo.org/glsa/glsa-200808-02.xml",
            },
            {
               name: "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/493218/100/0/threaded",
            },
            {
               name: "30665",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30665",
            },
            {
               name: "FEDORA-2008-5218",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html",
            },
            {
               name: "FEDORA-2008-5224",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html",
            },
            {
               name: "ADV-2008-1800",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2008/1800/references",
            },
            {
               name: "MDVSA-2008:118",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRIVA",
               ],
               url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118",
            },
            {
               name: "USN-685-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/usn-685-1",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/forum/forum.php?forum_id=833770",
            },
            {
               name: "1020218",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1020218",
            },
            {
               name: "30596",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30596",
            },
            {
               name: "oval:org.mitre.oval:def:5785",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785",
            },
            {
               name: "ADV-2009-1612",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2009/1612",
            },
            {
               name: "30574",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/30574",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cert@cert.org",
               ID: "CVE-2008-0960",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380",
                  },
                  {
                     name: "35463",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/35463",
                  },
                  {
                     name: "30615",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30615",
                  },
                  {
                     name: "http://support.apple.com/kb/HT2163",
                     refsource: "CONFIRM",
                     url: "http://support.apple.com/kb/HT2163",
                  },
                  {
                     name: "ADV-2008-1787",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1787/references",
                  },
                  {
                     name: "30648",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30648",
                  },
                  {
                     name: "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
                     refsource: "CONFIRM",
                     url: "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q",
                  },
                  {
                     name: "32664",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/32664",
                  },
                  {
                     name: "ADV-2008-1981",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1981/references",
                  },
                  {
                     name: "ADV-2008-1801",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1801/references",
                  },
                  {
                     name: "SUSE-SA:2008:039",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html",
                  },
                  {
                     name: "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability",
                     refsource: "MLIST",
                     url: "http://lists.ingate.com/pipermail/productinfo/2008/000021.html",
                  },
                  {
                     name: "31351",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31351",
                  },
                  {
                     name: "ADV-2008-1788",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1788/references",
                  },
                  {
                     name: "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
                     refsource: "CONFIRM",
                     url: "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm",
                  },
                  {
                     name: "FEDORA-2008-5215",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html",
                  },
                  {
                     name: "29623",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/29623",
                  },
                  {
                     name: "31334",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31334",
                  },
                  {
                     name: "ADV-2008-2971",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/2971",
                  },
                  {
                     name: "oval:org.mitre.oval:def:10820",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820",
                  },
                  {
                     name: "oval:org.mitre.oval:def:6414",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414",
                  },
                  {
                     name: "30626",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30626",
                  },
                  {
                     name: "SSRT080082",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
                     refsource: "MISC",
                     url: "http://www.vmware.com/security/advisories/VMSA-2008-0017.html",
                  },
                  {
                     name: "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2008/06/09/1",
                  },
                  {
                     name: "HPSBMA02439",
                     refsource: "HP",
                     url: "http://marc.info/?l=bugtraq&m=127730470825399&w=2",
                  },
                  {
                     name: "VU#878044",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/878044",
                  },
                  {
                     name: "30647",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30647",
                  },
                  {
                     name: "238865",
                     refsource: "SUNALERT",
                     url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1",
                  },
                  {
                     name: "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/497962/100/0/threaded",
                  },
                  {
                     name: "ADV-2008-1836",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1836/references",
                  },
                  {
                     name: "33003",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/33003",
                  },
                  {
                     name: "20080610 SNMP Version 3 Authentication Vulnerabilities",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml",
                  },
                  {
                     name: "ADV-2008-2361",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/2361",
                  },
                  {
                     name: "31568",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31568",
                  },
                  {
                     name: "31467",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/31467",
                  },
                  {
                     name: "APPLE-SA-2008-06-30",
                     refsource: "APPLE",
                     url: "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html",
                  },
                  {
                     name: "DSA-1663",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2008/dsa-1663",
                  },
                  {
                     name: "TA08-162A",
                     refsource: "CERT",
                     url: "http://www.us-cert.gov/cas/techalerts/TA08-162A.html",
                  },
                  {
                     name: "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
                     refsource: "CONFIRM",
                     url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS87",
                  },
                  {
                     name: "http://www.ocert.org/advisories/ocert-2008-006.html",
                     refsource: "MISC",
                     url: "http://www.ocert.org/advisories/ocert-2008-006.html",
                  },
                  {
                     name: "RHSA-2008:0528",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2008-0528.html",
                  },
                  {
                     name: "3933",
                     refsource: "SREASON",
                     url: "http://securityreason.com/securityalert/3933",
                  },
                  {
                     name: "RHSA-2008:0529",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2008-0529.html",
                  },
                  {
                     name: "30612",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30612",
                  },
                  {
                     name: "30802",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30802",
                  },
                  {
                     name: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
                     refsource: "CONFIRM",
                     url: "https://bugzilla.redhat.com/show_bug.cgi?id=447974",
                  },
                  {
                     name: "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
                     refsource: "CONFIRM",
                     url: "http://www.vmware.com/security/advisories/VMSA-2008-0013.html",
                  },
                  {
                     name: "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
                     refsource: "CONFIRM",
                     url: "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z",
                  },
                  {
                     name: "5790",
                     refsource: "EXPLOIT-DB",
                     url: "https://www.exploit-db.com/exploits/5790",
                  },
                  {
                     name: "ADV-2008-1797",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1797/references",
                  },
                  {
                     name: "GLSA-200808-02",
                     refsource: "GENTOO",
                     url: "http://security.gentoo.org/glsa/glsa-200808-02.xml",
                  },
                  {
                     name: "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/493218/100/0/threaded",
                  },
                  {
                     name: "30665",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30665",
                  },
                  {
                     name: "FEDORA-2008-5218",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html",
                  },
                  {
                     name: "FEDORA-2008-5224",
                     refsource: "FEDORA",
                     url: "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html",
                  },
                  {
                     name: "ADV-2008-1800",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2008/1800/references",
                  },
                  {
                     name: "MDVSA-2008:118",
                     refsource: "MANDRIVA",
                     url: "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118",
                  },
                  {
                     name: "USN-685-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/usn-685-1",
                  },
                  {
                     name: "http://sourceforge.net/forum/forum.php?forum_id=833770",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/forum/forum.php?forum_id=833770",
                  },
                  {
                     name: "1020218",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1020218",
                  },
                  {
                     name: "30596",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30596",
                  },
                  {
                     name: "oval:org.mitre.oval:def:5785",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785",
                  },
                  {
                     name: "ADV-2009-1612",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2009/1612",
                  },
                  {
                     name: "30574",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/30574",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "37e5125f-f79b-445b-8fad-9564f167944b",
      assignerShortName: "certcc",
      cveId: "CVE-2008-0960",
      datePublished: "2008-06-10T18:00:00",
      dateReserved: "2008-02-25T00:00:00",
      dateUpdated: "2024-08-07T08:01:40.150Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-5651 (GCVE-0-2007-5651)
Vulnerability from cvelistv5
Published
2007-10-23 21:00
Modified
2024-08-07 15:39
Severity ?
Summary
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:39:13.580Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "27329",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/27329",
               },
               {
                  name: "1018842",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1018842",
               },
               {
                  name: "oval:org.mitre.oval:def:5288",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288",
               },
               {
                  name: "26139",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/26139",
               },
               {
                  name: "cisco-eap-dos(37300)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300",
               },
               {
                  name: "ADV-2007-3566",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/3566",
               },
               {
                  name: "20071019 Extensible Authentication Protocol Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-10-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-09-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "27329",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/27329",
            },
            {
               name: "1018842",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1018842",
            },
            {
               name: "oval:org.mitre.oval:def:5288",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288",
            },
            {
               name: "26139",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/26139",
            },
            {
               name: "cisco-eap-dos(37300)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300",
            },
            {
               name: "ADV-2007-3566",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/3566",
            },
            {
               name: "20071019 Extensible Authentication Protocol Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-5651",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "27329",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/27329",
                  },
                  {
                     name: "1018842",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1018842",
                  },
                  {
                     name: "oval:org.mitre.oval:def:5288",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5288",
                  },
                  {
                     name: "26139",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/26139",
                  },
                  {
                     name: "cisco-eap-dos(37300)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/37300",
                  },
                  {
                     name: "ADV-2007-3566",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/3566",
                  },
                  {
                     name: "20071019 Extensible Authentication Protocol Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/en/US/products/products_security_response09186a00808de8bb.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-5651",
      datePublished: "2007-10-23T21:00:00",
      dateReserved: "2007-10-23T00:00:00",
      dateUpdated: "2024-08-07T15:39:13.580Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2005-4258 (GCVE-0-2005-4258)
Vulnerability from cvelistv5
Published
2005-12-15 11:00
Modified
2024-08-07 23:38
Severity ?
Summary
Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/44543vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/15864vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T23:38:51.592Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "cisco-catalyst-land-dos(44543)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543",
               },
               {
                  name: "15864",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/15864",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2005-12-14T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-19T15:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "cisco-catalyst-land-dos(44543)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543",
            },
            {
               name: "15864",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/15864",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2005-4258",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unspecified Cisco Catalyst Switches allow remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LanD). NOTE: the provenance of this issue is unknown; the details are obtained solely from the BID.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "cisco-catalyst-land-dos(44543)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/44543",
                  },
                  {
                     name: "15864",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/15864",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2005-4258",
      datePublished: "2005-12-15T11:00:00",
      dateReserved: "2005-12-15T00:00:00",
      dateUpdated: "2024-08-07T23:38:51.592Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2001-0429 (GCVE-0-2001-0429)
Vulnerability from cvelistv5
Published
2001-09-18 04:00
Modified
2024-08-08 04:21
Severity ?
Summary
Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.
References
http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtmlvendor-advisory, x_refsource_CISCO
http://www.securityfocus.com/bid/2604vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/6379vdb-entry, x_refsource_XF
http://www.ciac.org/ciac/bulletins/l-072.shtmlthird-party-advisory, government-resource, x_refsource_CIAC
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:21:38.484Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20010416 Catalyst 5000 Series 802.1x Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml",
               },
               {
                  name: "2604",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/2604",
               },
               {
                  name: "cisco-catalyst-8021x-dos(6379)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379",
               },
               {
                  name: "L-072",
                  tags: [
                     "third-party-advisory",
                     "government-resource",
                     "x_refsource_CIAC",
                     "x_transferred",
                  ],
                  url: "http://www.ciac.org/ciac/bulletins/l-072.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2001-04-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2005-11-02T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20010416 Catalyst 5000 Series 802.1x Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml",
            },
            {
               name: "2604",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/2604",
            },
            {
               name: "cisco-catalyst-8021x-dos(6379)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379",
            },
            {
               name: "L-072",
               tags: [
                  "third-party-advisory",
                  "government-resource",
                  "x_refsource_CIAC",
               ],
               url: "http://www.ciac.org/ciac/bulletins/l-072.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-0429",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco Catalyst 5000 series switches 6.1(2) and earlier will forward an 802.1x frame on a Spanning Tree Protocol (STP) blocked port, which causes a network storm and a denial of service.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20010416 Catalyst 5000 Series 802.1x Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cat5k-8021x-vuln-pub.shtml",
                  },
                  {
                     name: "2604",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/2604",
                  },
                  {
                     name: "cisco-catalyst-8021x-dos(6379)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6379",
                  },
                  {
                     name: "L-072",
                     refsource: "CIAC",
                     url: "http://www.ciac.org/ciac/bulletins/l-072.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-0429",
      datePublished: "2001-09-18T04:00:00",
      dateReserved: "2001-05-24T00:00:00",
      dateUpdated: "2024-08-08T04:21:38.484Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2002-1222 (GCVE-0-2002-1222)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
Summary
Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T03:19:28.135Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20021016 Cisco CatOS Embedded HTTP Server Buffer Overflow",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml",
               },
               {
                  name: "cisco-catalyst-ciscoview-bo(10382)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "http://www.iss.net/security_center/static/10382.php",
               },
               {
                  name: "5976",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/5976",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2002-10-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2003-02-26T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20021016 Cisco CatOS Embedded HTTP Server Buffer Overflow",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml",
            },
            {
               name: "cisco-catalyst-ciscoview-bo(10382)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "http://www.iss.net/security_center/static/10382.php",
            },
            {
               name: "5976",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/5976",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-1222",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the embedded HTTP server for Cisco Catalyst switches running CatOS 5.4 through 7.3 allows remote attackers to cause a denial of service (reset) via a long HTTP request.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20021016 Cisco CatOS Embedded HTTP Server Buffer Overflow",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/catos-http-overflow-vuln.shtml",
                  },
                  {
                     name: "cisco-catalyst-ciscoview-bo(10382)",
                     refsource: "XF",
                     url: "http://www.iss.net/security_center/static/10382.php",
                  },
                  {
                     name: "5976",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/5976",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-1222",
      datePublished: "2004-09-01T04:00:00",
      dateReserved: "2002-10-17T00:00:00",
      dateUpdated: "2024-08-08T03:19:28.135Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2000-0267 (GCVE-0-2000-0267)
Vulnerability from cvelistv5
Published
2000-06-02 04:00
Modified
2024-08-08 05:14
Severity ?
Summary
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
References
http://www.securityfocus.com/bid/1122vdb-entry, x_refsource_BID
http://www.osvdb.org/1288vdb-entry, x_refsource_OSVDB
http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtmlvendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:14:20.449Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1122",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/1122",
               },
               {
                  name: "1288",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/1288",
               },
               {
                  name: "20000419 Cisco Catalyst Enable Password Bypass Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-04-19T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2004-09-02T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1122",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/1122",
            },
            {
               name: "1288",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/1288",
            },
            {
               name: "20000419 Cisco Catalyst Enable Password Bypass Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-0267",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1122",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/1122",
                  },
                  {
                     name: "1288",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/1288",
                  },
                  {
                     name: "20000419 Cisco Catalyst Enable Password Bypass Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-0267",
      datePublished: "2000-06-02T04:00:00",
      dateReserved: "2000-04-26T00:00:00",
      dateUpdated: "2024-08-08T05:14:20.449Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2001-1071 (GCVE-0-2001-1071)
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 04:44
Severity ?
Summary
Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.
References
http://www.osvdb.org/1969vdb-entry, x_refsource_OSVDB
https://exchange.xforce.ibmcloud.com/vulnerabilities/7242vdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/139491third-party-advisory, x_refsource_CERT-VN
http://www.securityfocus.com/archive/1/219257mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/3412vdb-entry, x_refsource_BID
http://www.securityfocus.com/archive/1/219305mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:44:07.007Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1969",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/1969",
               },
               {
                  name: "cisco-ios-cdp-dos(7242)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242",
               },
               {
                  name: "VU#139491",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/139491",
               },
               {
                  name: "20011009 Cisco CDP attacks",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/219257",
               },
               {
                  name: "3412",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/3412",
               },
               {
                  name: "20011009 Cisco Systems - Vulnerability in CDP",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/219305",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2001-10-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2009-03-02T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1969",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/1969",
            },
            {
               name: "cisco-ios-cdp-dos(7242)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242",
            },
            {
               name: "VU#139491",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/139491",
            },
            {
               name: "20011009 Cisco CDP attacks",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/219257",
            },
            {
               name: "3412",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/3412",
            },
            {
               name: "20011009 Cisco Systems - Vulnerability in CDP",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/219305",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-1071",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco IOS 12.2 and earlier running Cisco Discovery Protocol (CDP) allows remote attackers to cause a denial of service (memory consumption) via a flood of CDP neighbor announcements.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1969",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/1969",
                  },
                  {
                     name: "cisco-ios-cdp-dos(7242)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7242",
                  },
                  {
                     name: "VU#139491",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/139491",
                  },
                  {
                     name: "20011009 Cisco CDP attacks",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/219257",
                  },
                  {
                     name: "3412",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/3412",
                  },
                  {
                     name: "20011009 Cisco Systems - Vulnerability in CDP",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/219305",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-1071",
      datePublished: "2002-06-25T04:00:00",
      dateReserved: "2002-01-31T00:00:00",
      dateUpdated: "2024-08-08T04:44:07.007Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2002-1024 (GCVE-0-2002-1024)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:12
Severity ?
Summary
Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).
References
http://www.securityfocus.com/bid/5114vdb-entry, x_refsource_BID
http://www.iss.net/security_center/static/9437.phpvdb-entry, x_refsource_XF
http://www.kb.cert.org/vuls/id/290140third-party-advisory, x_refsource_CERT-VN
http://www.cisco.com/warp/public/707/SSH-scanning.shtmlvendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T03:12:16.644Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "5114",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/5114",
               },
               {
                  name: "cisco-ssh-scan-dos(9437)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "http://www.iss.net/security_center/static/9437.php",
               },
               {
                  name: "VU#290140",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/290140",
               },
               {
                  name: "20020627 Scanning for SSH Can Cause a Crash",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/SSH-scanning.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2002-06-27T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2009-03-02T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "5114",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/5114",
            },
            {
               name: "cisco-ssh-scan-dos(9437)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "http://www.iss.net/security_center/static/9437.php",
            },
            {
               name: "VU#290140",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/290140",
            },
            {
               name: "20020627 Scanning for SSH Can Cause a Crash",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/SSH-scanning.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-1024",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco IOS 12.0 through 12.2, when supporting SSH, allows remote attackers to cause a denial of service (CPU consumption) via a large packet that was designed to exploit the SSH CRC32 attack detection overflow (CVE-2001-0144).",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "5114",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/5114",
                  },
                  {
                     name: "cisco-ssh-scan-dos(9437)",
                     refsource: "XF",
                     url: "http://www.iss.net/security_center/static/9437.php",
                  },
                  {
                     name: "VU#290140",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/290140",
                  },
                  {
                     name: "20020627 Scanning for SSH Can Cause a Crash",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/SSH-scanning.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-1024",
      datePublished: "2003-04-02T05:00:00",
      dateReserved: "2002-08-27T00:00:00",
      dateUpdated: "2024-08-08T03:12:16.644Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2001-0041 (GCVE-0-2001-0041)
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:06
Severity ?
Summary
Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.
References
http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtmlvendor-advisory, x_refsource_CISCO
http://www.securityfocus.com/bid/2072vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/5656vdb-entry, x_refsource_XF
http://www.osvdb.org/801vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:06:54.553Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20001206 Cisco Catalyst Memory Leak Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml",
               },
               {
                  name: "2072",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/2072",
               },
               {
                  name: "cisco-catalyst-telnet-dos(5656)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656",
               },
               {
                  name: "801",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://www.osvdb.org/801",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-12-06T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2004-09-02T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20001206 Cisco Catalyst Memory Leak Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml",
            },
            {
               name: "2072",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/2072",
            },
            {
               name: "cisco-catalyst-telnet-dos(5656)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656",
            },
            {
               name: "801",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://www.osvdb.org/801",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-0041",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Memory leak in Cisco Catalyst 4000, 5000, and 6000 series switches allows remote attackers to cause a denial of service via a series of failed telnet authentication attempts.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20001206 Cisco Catalyst Memory Leak Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml",
                  },
                  {
                     name: "2072",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/2072",
                  },
                  {
                     name: "cisco-catalyst-telnet-dos(5656)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5656",
                  },
                  {
                     name: "801",
                     refsource: "OSVDB",
                     url: "http://www.osvdb.org/801",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-0041",
      datePublished: "2001-05-07T04:00:00",
      dateReserved: "2001-02-01T00:00:00",
      dateUpdated: "2024-08-08T04:06:54.553Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-0551 (GCVE-0-2004-0551)
Vulnerability from cvelistv5
Published
2004-06-15 04:00
Modified
2024-08-08 00:24
Severity ?
Summary
Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka "TCP-ACK DoS attack."
References
http://www.kb.cert.org/vuls/id/245190third-party-advisory, x_refsource_CERT-VN
http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtmlvendor-advisory, x_refsource_CISCO
https://exchange.xforce.ibmcloud.com/vulnerabilities/16370vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T00:24:26.408Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "VU#245190",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/245190",
               },
               {
                  name: "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
               },
               {
                  name: "cisco-catalyst-ack-dos(16370)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-06-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\"",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "VU#245190",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/245190",
            },
            {
               name: "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
            },
            {
               name: "cisco-catalyst-ack-dos(16370)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-0551",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco CatOS 5.x before 5.5(20) through 8.x before 8.2(2) and 8.3(2)GLX, as used in Catalyst switches, allows remote attackers to cause a denial of service (system crash and reload) by sending invalid packets instead of the final ACK portion of the three-way handshake to the (1) Telnet, (2) HTTP, or (3) SSH services, aka \"TCP-ACK DoS attack.\"",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "VU#245190",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/245190",
                  },
                  {
                     name: "20040609 Cisco CatOS Telnet, HTTP and SSH Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml",
                  },
                  {
                     name: "cisco-catalyst-ack-dos(16370)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/16370",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-0551",
      datePublished: "2004-06-15T04:00:00",
      dateReserved: "2004-06-11T00:00:00",
      dateUpdated: "2024-08-08T00:24:26.408Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2003-0216 (GCVE-0-2003-0216)
Vulnerability from cvelistv5
Published
2003-04-26 04:00
Modified
2024-08-08 01:43
Severity ?
Summary
Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.
References
http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.vendor-advisory, x_refsource_CISCO
http://www.kb.cert.org/vuls/id/443257third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T01:43:36.093Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.",
               },
               {
                  name: "VU#443257",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/443257",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2003-04-24T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2005-03-11T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.",
            },
            {
               name: "VU#443257",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/443257",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2003-0216",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unknown vulnerability in Cisco Catalyst 7.5(1) allows local users to bypass authentication and gain access to the enable mode without a password.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20030424 Cisco Security Advisory: Cisco Catalyst Enable Password Bypass Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20030424-catos.shtml.",
                  },
                  {
                     name: "VU#443257",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/443257",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2003-0216",
      datePublished: "2003-04-26T04:00:00",
      dateReserved: "2003-04-24T00:00:00",
      dateUpdated: "2024-08-08T01:43:36.093Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2003-1002 (GCVE-0-2003-1002)
Vulnerability from cvelistv5
Published
2003-12-17 05:00
Modified
2024-09-16 18:56
Severity ?
Summary
Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.
References
http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtmlvendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T02:12:35.535Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20031215 Cisco FWSM Vulnerabilities",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2003-12-17T05:00:00Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20031215 Cisco FWSM Vulnerabilities",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2003-1002",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via an SNMPv3 message when snmp-server is set.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20031215 Cisco FWSM Vulnerabilities",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2003-1002",
      datePublished: "2003-12-17T05:00:00Z",
      dateReserved: "2003-12-16T00:00:00Z",
      dateUpdated: "2024-09-16T18:56:00.738Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2004-1775 (GCVE-0-2004-1775)
Vulnerability from cvelistv5
Published
2005-04-21 04:00
Modified
2024-08-08 01:00
Severity ?
Summary
Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/6179vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/5030vdb-entry, x_refsource_BID
http://www.kb.cert.org/vuls/id/645400third-party-advisory, x_refsource_CERT-VN
http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtmlvendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T01:00:37.345Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "cisco-snmp-vacm(6179)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179",
               },
               {
                  name: "5030",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/5030",
               },
               {
                  name: "VU#645400",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/645400",
               },
               {
                  name: "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2004-10-08T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-10T14:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "cisco-snmp-vacm(6179)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179",
            },
            {
               name: "5030",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/5030",
            },
            {
               name: "VU#645400",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/645400",
            },
            {
               name: "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2004-1775",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco VACM (View-based Access Control MIB) for Catalyst Operating Software (CatOS) 5.5 and 6.1 and IOS 12.0 and 12.1 allows remote attackers to read and modify device configuration via the read-write community string.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "cisco-snmp-vacm(6179)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/6179",
                  },
                  {
                     name: "5030",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/5030",
                  },
                  {
                     name: "VU#645400",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/645400",
                  },
                  {
                     name: "20041008 Cisco IOS Software Multiple SNMP Community String Vulnerabilities",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2004-1775",
      datePublished: "2005-04-21T04:00:00",
      dateReserved: "2005-04-21T00:00:00",
      dateUpdated: "2024-08-08T01:00:37.345Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2007-5134 (GCVE-0-2007-5134)
Vulnerability from cvelistv5
Published
2007-09-27 19:00
Modified
2024-08-07 15:17
Severity ?
Summary
Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.
References
http://www.securitytracker.com/id?1018743vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/26988third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/3276vdb-entry, x_refsource_VUPEN
http://seclists.org/fulldisclosure/2007/Sep/0573.htmlmailing-list, x_refsource_FULLDISC
https://exchange.xforce.ibmcloud.com/vulnerabilities/36826vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/25822vdb-entry, x_refsource_BID
http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtmlvendor-advisory, x_refsource_CISCO
http://securitytracker.com/id?1018742vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T15:17:28.414Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "1018743",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1018743",
               },
               {
                  name: "26988",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/26988",
               },
               {
                  name: "ADV-2007-3276",
                  tags: [
                     "vdb-entry",
                     "x_refsource_VUPEN",
                     "x_transferred",
                  ],
                  url: "http://www.vupen.com/english/advisories/2007/3276",
               },
               {
                  name: "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2007/Sep/0573.html",
               },
               {
                  name: "cisco-catalyst-loopback-acl-bypass(36826)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826",
               },
               {
                  name: "25822",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/25822",
               },
               {
                  name: "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
               },
               {
                  name: "1018742",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1018742",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2007-09-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-07-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "1018743",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1018743",
            },
            {
               name: "26988",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/26988",
            },
            {
               name: "ADV-2007-3276",
               tags: [
                  "vdb-entry",
                  "x_refsource_VUPEN",
               ],
               url: "http://www.vupen.com/english/advisories/2007/3276",
            },
            {
               name: "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2007/Sep/0573.html",
            },
            {
               name: "cisco-catalyst-loopback-acl-bypass(36826)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826",
            },
            {
               name: "25822",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/25822",
            },
            {
               name: "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
            },
            {
               name: "1018742",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1018742",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2007-5134",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco Catalyst 6500 and Cisco 7600 series devices use 127/8 IP addresses for Ethernet Out-of-Band Channel (EOBC) internal communication, which might allow remote attackers to send packets to an interface for which network exposure was unintended.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "1018743",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1018743",
                  },
                  {
                     name: "26988",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/26988",
                  },
                  {
                     name: "ADV-2007-3276",
                     refsource: "VUPEN",
                     url: "http://www.vupen.com/english/advisories/2007/3276",
                  },
                  {
                     name: "20070927 Re: CAT6500 accessible via 127.0.0.x loopback addresses",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2007/Sep/0573.html",
                  },
                  {
                     name: "cisco-catalyst-loopback-acl-bypass(36826)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/36826",
                  },
                  {
                     name: "25822",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/25822",
                  },
                  {
                     name: "20070926 Catalyst 6500 and Cisco 7600 Series Devices Accessible via Loopback Address",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sr-20070926-lb.shtml",
                  },
                  {
                     name: "1018742",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1018742",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2007-5134",
      datePublished: "2007-09-27T19:00:00",
      dateReserved: "2007-09-27T00:00:00",
      dateUpdated: "2024-08-07T15:17:28.414Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2003-1001 (GCVE-0-2003-1001)
Vulnerability from cvelistv5
Published
2003-12-17 05:00
Modified
2024-09-16 16:32
Severity ?
Summary
Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.
References
http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtmlvendor-advisory, x_refsource_CISCO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T02:12:35.507Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20031215 Cisco FWSM Vulnerabilities",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2003-12-17T05:00:00Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20031215 Cisco FWSM Vulnerabilities",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2003-1001",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Buffer overflow in the Cisco Firewall Services Module (FWSM) in Cisco Catalyst 6500 and 7600 series devices allows remote attackers to cause a denial of service (crash and reload) via HTTP auth requests for (1) TACACS+ or (2) RADIUS authentication.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20031215 Cisco FWSM Vulnerabilities",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/warp/public/707/cisco-sa-20031215-fwsm.shtml",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2003-1001",
      datePublished: "2003-12-17T05:00:00Z",
      dateReserved: "2003-12-16T00:00:00Z",
      dateUpdated: "2024-09-16T16:32:54.654Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2002-2316 (GCVE-0-2002-2316)
Vulnerability from cvelistv5
Published
2007-10-26 19:00
Modified
2024-09-16 20:02
Severity ?
Summary
Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T03:59:11.386Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20020618 Re: Catalyst 4000 - Cisco's Response",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html",
               },
               {
                  name: "4790",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/4790",
               },
               {
                  name: "cisco-catalyst-unicast-traffic(9148)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "http://www.iss.net/security_center/static/9148.php",
               },
               {
                  name: "20020520 Catalyst 4000",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2007-10-26T19:00:00Z",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20020618 Re: Catalyst 4000 - Cisco's Response",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html",
            },
            {
               name: "4790",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/4790",
            },
            {
               name: "cisco-catalyst-unicast-traffic(9148)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "http://www.iss.net/security_center/static/9148.php",
            },
            {
               name: "20020520 Catalyst 4000",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-2316",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Cisco Catalyst 4000 series switches running CatOS 5.5.5, 6.3.5, and 7.1.2 do not always learn MAC addresses from a single initial packet, which causes unicast traffic to be broadcast across the switch and allows remote attackers to obtain sensitive network information by sniffing.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20020618 Re: Catalyst 4000 - Cisco's Response",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2002-06/0209.html",
                  },
                  {
                     name: "4790",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/4790",
                  },
                  {
                     name: "cisco-catalyst-unicast-traffic(9148)",
                     refsource: "XF",
                     url: "http://www.iss.net/security_center/static/9148.php",
                  },
                  {
                     name: "20020520 Catalyst 4000",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2002-05/0190.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-2316",
      datePublished: "2007-10-26T19:00:00Z",
      dateReserved: "2007-10-26T00:00:00Z",
      dateUpdated: "2024-09-16T20:02:35.479Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2008-4963 (GCVE-0-2008-4963)
Vulnerability from cvelistv5
Published
2008-11-06 11:00
Modified
2024-08-07 10:31
Severity ?
Summary
Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.
References
http://secunia.com/advisories/32573third-party-advisory, x_refsource_SECUNIA
http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.htmlvendor-advisory, x_refsource_CISCO
http://securitytracker.com/id?1021143vdb-entry, x_refsource_SECTRACK
http://www.securitytracker.com/id?1021144vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/46346vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/32120vdb-entry, x_refsource_BID
http://osvdb.org/49601vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-07T10:31:28.334Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "32573",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/32573",
               },
               {
                  name: "20081105 Cisco VLAN Trunking Protocol Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html",
               },
               {
                  name: "1021143",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://securitytracker.com/id?1021143",
               },
               {
                  name: "1021144",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id?1021144",
               },
               {
                  name: "cisco-ios-catos-vtp-dos(46346)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346",
               },
               {
                  name: "32120",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/32120",
               },
               {
                  name: "49601",
                  tags: [
                     "vdb-entry",
                     "x_refsource_OSVDB",
                     "x_transferred",
                  ],
                  url: "http://osvdb.org/49601",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2008-11-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-07T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "32573",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/32573",
            },
            {
               name: "20081105 Cisco VLAN Trunking Protocol Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html",
            },
            {
               name: "1021143",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://securitytracker.com/id?1021143",
            },
            {
               name: "1021144",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id?1021144",
            },
            {
               name: "cisco-ios-catos-vtp-dos(46346)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346",
            },
            {
               name: "32120",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/32120",
            },
            {
               name: "49601",
               tags: [
                  "vdb-entry",
                  "x_refsource_OSVDB",
               ],
               url: "http://osvdb.org/49601",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2008-4963",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Unspecified vulnerability in the VLAN Trunking Protocol (VTP) implementation on Cisco IOS and CatOS, when the VTP operating mode is not transparent, allows remote attackers to cause a denial of service (device reload or hang) via a crafted VTP packet sent to a switch interface configured as a trunk port.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "32573",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/32573",
                  },
                  {
                     name: "20081105 Cisco VLAN Trunking Protocol Vulnerability",
                     refsource: "CISCO",
                     url: "http://www.cisco.com/en/US/products/products_security_response09186a0080a231cf.html",
                  },
                  {
                     name: "1021143",
                     refsource: "SECTRACK",
                     url: "http://securitytracker.com/id?1021143",
                  },
                  {
                     name: "1021144",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id?1021144",
                  },
                  {
                     name: "cisco-ios-catos-vtp-dos(46346)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/46346",
                  },
                  {
                     name: "32120",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/32120",
                  },
                  {
                     name: "49601",
                     refsource: "OSVDB",
                     url: "http://osvdb.org/49601",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2008-4963",
      datePublished: "2008-11-06T11:00:00",
      dateReserved: "2008-11-06T00:00:00",
      dateUpdated: "2024-08-07T10:31:28.334Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}