var-201308-0052
Vulnerability from variot
The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795. Open Shortest Path First (OSPF) The protocol specifications include: Link State Advertisement (LSA) There is a problem with the identification of. OSPF Specified in the protocol LSA Is LS Type , Advertising Router and Link State ID is included. OSPF In the provisions of router-LSA of Link State ID When Advertising Router Are supposed to be set to the same value. These two values are different, crafted router-LSA The contents of the routing table may be altered by receiving.The expected impact varies depending on each product and implementation. (DoS) An attacker may be able to attack you or direct network traffic to another router. OSPF is a routing protocol defined by RFC 2328 and is designed to manage IP routes in an AS. OSPF packets use the 89 IP protocol number. A vulnerability exists in the related OSPF routing protocol LSA database. Several Cisco products are affected by this vulnerability. This vulnerability allows unverified attackers to fully control the OSPF AS domain routing table, discard blackhole traffic, and intercept communications, which can lead to denial of service attacks. An attacker can inject a specially crafted OSPF packet to trigger the vulnerability. Successful exploitation of the vulnerability can \"clean\" the routing table on the target router and propagate the specially crafted OSPF LSA type 1 update to the entire OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters in the LSA data on the target router. This vulnerability can only be triggered by sending a specially crafted unicast or multicast LSA type 1 message. The other LSA type packets cannot trigger the vulnerability. The OSPFv3 and Fabric Shortest Path First (FSPF) protocols do not affect this vulnerability. This may aid in further attacks. IOS, IOS-XE, and NX-OS are all operating systems developed for their network devices. Both ASA and FWSM are firewall devices. The following products and versions are affected: Cisco IOS Releases 12.0 to 12.4 and 15.0 to 15.3, IOS-XE Releases 2.x to 3.9.xS, ASA and PIX Releases 7.x to 9.1, FWSM, NX-OS, StarOS 14.0. Versions prior to 50488
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0052", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ios 12.0", scope: null, trust: 6.3, vendor: "cisco", version: null, }, { model: "ios 12.0 w5", scope: null, trust: 5.4, vendor: "cisco", version: null, }, { model: "ios 12.0 s", scope: null, trust: 5.4, vendor: "cisco", version: null, }, { model: "ios 12.1", scope: null, trust: 3.6, vendor: "cisco", version: null, }, { model: "ios 12.0 s1", scope: null, trust: 3.3, vendor: "cisco", version: null, }, { model: "ios 12.1 e", scope: null, trust: 3, vendor: "cisco", version: null, }, { model: "ios 12.0 s6", scope: null, trust: 3, vendor: "cisco", version: null, }, { model: "ios 12.1 e1", scope: null, trust: 2.7, vendor: "cisco", version: null, }, { model: "ios 12.0 s5", scope: null, trust: 2.4, vendor: "cisco", version: null, }, { model: "ios 12.0 s3", scope: null, trust: 2.4, vendor: "cisco", version: null, }, { model: "ios 12.0 s4", scope: null, trust: 2.1, vendor: "cisco", version: null, }, { model: "ios 12.1 ea1", scope: null, trust: 2.1, vendor: "cisco", version: null, }, { model: "ios 12.1 ex", scope: null, trust: 2.1, vendor: "cisco", version: null, }, { model: "ios 12.1 e3", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios 12.0 s8", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios 12.0 s7", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios 12.1 ea1a", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios 12.1 t", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios 12.0 st", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios 12.1 e4", scope: null, trust: 1.8, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1\\(9\\)ex", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1cx", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1\\(8\\)ea", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1aa", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1az", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1ax", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1da", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1\\(8a\\)ex", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1\\(9\\)ea", }, { model: "ios", scope: "eq", trust: 1.6, vendor: "cisco", version: "12.1ay", }, { model: "ios 12.0 xe", scope: null, trust: 1.5, vendor: "cisco", version: null, }, { model: "ios 12.0 s2", scope: null, trust: 1.5, vendor: "cisco", version: null, }, { model: "firewall services module", scope: null, trust: 1.4, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 1.3, vendor: "cisco", version: "2.4.1", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.0", }, { model: "ios xe", scope: "eq", trust: 1.3, vendor: "cisco", version: "2.2.3", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.1", }, { model: "ios", scope: "eq", trust: 1.3, vendor: "cisco", version: "12.0xv", }, { model: "ios 12.1 dc2", scope: null, trust: 1.2, vendor: "cisco", version: null, }, { model: "ios 12.1 ec", scope: null, trust: 1.2, vendor: "cisco", version: null, }, { model: "ios 12.0 t", scope: null, trust: 1.2, vendor: "cisco", version: null, }, { model: "ios 12.1 e7", scope: null, trust: 1.2, vendor: "cisco", version: null, }, { model: "ios 12.1 ew", scope: null, trust: 1.2, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10.5\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)ew3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.2.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yj", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "8.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(32\\)s13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7a\\)ey3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.6.1", }, { model: "pix firewall software", scope: "eq", trust: 1, vendor: "cisco", version: "9.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(11a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xz", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ez1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xd", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "9.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0wt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)w5-32a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)xb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xg", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc2b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)st6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)xa3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(32\\)s12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)sy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(30\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.3\\)wc1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.5.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew", }, { model: "pix firewall software", scope: "eq", trust: 1, vendor: "cisco", version: "7.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sv", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.6.2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xe2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)sl", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.1.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)st2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yb", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.0sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1gb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e20", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7a\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)ea1b", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e17", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0wx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xn1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)e4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12\\)s4", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.00.xo.15.0\\(2\\)xo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6.5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(11\\)st4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)w5\\(22b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16a\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5.1s", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.5s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xv", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)e7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)st5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1.3\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)w5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(30\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)eo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20.4\\)sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19.3\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s4a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28c\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.3.1t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.4\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)e14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)e5", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.4sg", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.1.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)w5-27d", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.3.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sp1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xf1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14.5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yd", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.4.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e14", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)db2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1eo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xt", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)sv", }, { model: "pix firewall software", scope: "eq", trust: 1, vendor: "cisco", version: "9.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc3b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xy", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.3sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)da2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)w5\\(18f\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)t2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)w5\\(27c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ea1c", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)ec", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "8.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)ev01", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13.4\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ey", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)dc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)ea2b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(6\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)ex4", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.6.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12b\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.5.2", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "7.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xm1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)w", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e16", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6.5\\)ec3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)t3", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xe", }, { model: "nx-os", scope: "eq", trust: 1, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0db", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "8.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(33\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.4\\)wc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)sc3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)yb4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(6b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1yi", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.1sg", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10a\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.2sg", }, { model: "pix firewall software", scope: "eq", trust: 1, vendor: "cisco", version: "7.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8.0.2\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16.06\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)st7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)aa1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s8", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.0s", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.6.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.4s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1x\\(l\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)st8", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)w5-30b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.2\\)xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)xf5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1a\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ea1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e18", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc5a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xk2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(31\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)w5\\(31a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(16\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ea", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xc", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xr", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.6\\)w5\\(9.0.5\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)w5\\(20\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xe1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)w5\\(28\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ex2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.3\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(11\\)s6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ev", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28d\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)t1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11\\)ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xb", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)sp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)e", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.2.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)w5\\(27\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)st6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5a\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1eb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)st1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.7.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3.2\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xk2", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.6.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)fc1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.4.3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(9\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.3s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s6", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s5a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.1.1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.3s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ea2c", }, { model: "pix firewall software", scope: "eq", trust: 1, vendor: "cisco", version: "7.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ec2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11.5\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(32\\)sy9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)s8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e13", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)sv1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(32\\)sy8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)aa", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.xs", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.4.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)sl4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0da", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)w5\\(18g\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(30\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)st2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)ew4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12c\\)ec", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3.3s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8.3\\)sc", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.1sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(22\\)s5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(12\\)", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.0sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)ex3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)sl", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)sv2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)s7", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.1.4s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(11b\\)e12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)wt6\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xn", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0w", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1eu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)st6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(33\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(8a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)e1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(05\\)wc8", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24.2\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc11", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)w5\\(28a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xf", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ec1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3.0sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)sx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8b\\)e15", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)eo1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.4.0as", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ye", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.2.0xo", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(9\\)e3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)w5\\(19c\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)st1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)e", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "9.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0wc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)dc1", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.5.xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(15\\)bc1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(19\\)s2a", }, { model: "fwsm", scope: "eq", trust: 1, vendor: "cisco", version: "*", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(31\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ec", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.3.0", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "7.2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(1\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(27\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)eb", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)s", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.7.1s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ew4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc9a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(12\\)s3", }, { model: "asa 5500", scope: "eq", trust: 1, vendor: "cisco", version: "7.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.3.1sg", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)s3b", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5.1\\)xp", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0w5", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xk", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)eo3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)cx", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7.4\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(8a\\)ew1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xw", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)aa", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ea1a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xi", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(4\\)xm", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s5a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)w5\\(22b\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(26\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(18.4\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)db2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(24\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ga", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ew4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e12", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)sc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)dc", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)ec1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xh", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s8a", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)s2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)sl6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)db", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)ay", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)ew", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)e9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(2\\)xd", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.4.4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(13\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xx", }, { model: "pix firewall software", scope: "eq", trust: 1, vendor: "cisco", version: "8.0\\(2\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ez", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1db", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xj", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(1\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(28\\)s3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)st3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7a\\)e6", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(18\\)s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(21\\)st", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1ya", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(2\\)xf4", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(15\\)s7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)wc13", }, { model: "staros", scope: "eq", trust: 1, vendor: "cisco", version: "14.0", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(17\\)st1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xq", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(20\\)e", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(13\\)s6", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.3.1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(10\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)w5\\(21\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7a\\)ey", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.9.0s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(6\\)ez2", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)wx5\\(15a\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(25.4\\)s1", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(14\\)e9", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1m", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(7\\)xk3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(23\\)sz", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3\\)xe", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xs", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0ev", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(16\\)s10", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1sec", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1xu", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(19\\)e6", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "2.5.0", }, { model: "ios xe", scope: "eq", trust: 1, vendor: "cisco", version: "3.6.2s", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0xd", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(20\\)st7", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0sy", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(10\\)ex", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(3\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(7\\)da3", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.1\\(18\\)", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(5\\)t", }, { model: "ios", scope: "eq", trust: 1, vendor: "cisco", version: "12.0\\(14\\)s8", }, { model: "ios 12.1 e8", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 e2", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 dc", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.0 st6", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.0 db", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 ew1", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 ew4", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 db1", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 ea1c", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.0 sx", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.0 st1", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 e5", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 ey", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: "ios 12.1 ew2", scope: null, trust: 0.9, vendor: "cisco", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "brocade", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "check point", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "d link", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "enterasys", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "extreme", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "ibm", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "juniper", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "nec", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "oracle", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "vyatta", version: null, }, { model: null, scope: null, trust: 0.8, vendor: "yamaha", version: null, }, { model: "asa 5500 series", scope: "eq", trust: 0.8, vendor: "cisco", version: "7.x to 9.1", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "12.0 to 12.4", }, { model: "ios", scope: "eq", trust: 0.8, vendor: "cisco", version: "15.0 to 15.3", }, { model: "ios xe", scope: "eq", trust: 0.8, vendor: "cisco", version: "2.x to 3.9.xs", }, { model: "nx-os", scope: null, trust: 0.8, vendor: "cisco", version: null, }, { model: "pix firewall software", scope: "eq", trust: 0.8, vendor: "cisco", version: "7.x to 9.1", }, { model: "staros", scope: "lt", trust: 0.8, vendor: "cisco", version: "14.0.50488", }, { model: "nx-os software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "asr", scope: "eq", trust: 0.6, vendor: "cisco", version: "5000", }, { model: "ios software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios-xe software", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "adaptive security appliance", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "asa service module", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "pix firewall", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 st7", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 t7", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 xk1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 e14", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 eb2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 t1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 ec1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 s5a", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 db2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 e12", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "nx-os 4.1 n2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 xt2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 t3", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 xe1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 xs", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 xe?", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 s10", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 xm4", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 wc1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 e6", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 xu", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 t2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 dc1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 e9", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 st2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 xk2", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 ea1b", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 sc", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 e10", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 wc9", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 wc", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 eb", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.1 db", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 sy", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 12.0 xk", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.6, vendor: "cisco", version: "12.0.7", }, { model: "ios 12.1 t1", scope: null, trust: 0.6, vendor: "cisco", version: null, }, { model: "ios 15.0 m5a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc 2900xl-lre", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 e", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc10", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc17", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.1", }, { model: "ios 12.1 ea4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xk3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(24)", }, { model: "ios 12.1 ea9", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xf4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(21)", }, { model: "ios 12.0xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(28)", }, { model: "ios 12.0xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(1)", }, { model: "ios 12.1 ea7", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe 3.1xsg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy7", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 bc1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s4a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(20)", }, { model: "ios 15.1 m1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc13", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 eo1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 dc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sv2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s8a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea1d", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.1m", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(18)", }, { model: "ios 12.0 xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 e17", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy11", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.1 m4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(13)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(16)", }, { model: "ios 12.0wc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xk", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea6", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sv", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 t10", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 eb1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sp1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xb", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(25)", }, { model: "ios 12.1 ea1e", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xf", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.2", }, { model: "ios 12.0 xs?", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.1", }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0(0.54)", }, { model: "ios 12.1 ea11", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(2)", }, { model: "ios 12.0 sz10", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(14)", }, { model: "ios 12.1 ea10b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.2(1)", }, { model: "ios 12.0 sy9a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.5", }, { model: "ios 12.0xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xh", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(14)", }, { model: "ios 12.0 wc3b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(11)", }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1.1", }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.2", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.19", }, { model: "ios 12.0 xm1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(18.4)", }, { model: "ios 12.0da", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.6", }, { model: "ios 12.0 wc16", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy9b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 5.0 u2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xj", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 4.2 sv1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xe2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios t", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.4", }, { model: "ios 12.0xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0st", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xf", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1(1.1)", }, { model: "ios s", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.4", }, { model: "ios 12.0 s9", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xu", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xi2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0w5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xa3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ec2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.2", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(17)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(25)", }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0.5", }, { model: "ios 12.0 yb4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe 3.1.xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(8)", }, { model: "ios 12.0 wc8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 5.1 n1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(7)", }, { model: "ios 12.1 ea13", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 eo6", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios t2", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.3", }, { model: "ios 12.1 xp4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 eo3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 5.0 n2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 t4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xc", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.2", }, { model: "ios 12.0xn", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s12", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe 3.2.0sg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.2", }, { model: "ios 12.1 da1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.1 m3a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xi8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xg", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.2", }, { model: "ios 12.0 st4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xi", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(13)", }, { model: "ios 12.1 ev3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.1 t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xj5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ew3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios w", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.1", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(5)xv3", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(20)", }, { model: "ios 12.1 ex2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sv", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xf5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 yj3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(11.1)", }, { model: "ios 12.0 xf1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xq", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc14", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xe", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 w5-30b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xr2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xr", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s15", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(5)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(22)", }, { model: "ios 12.0 sy8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 m1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.4", }, { model: "ios 12.0 sy4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 t6", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.5", }, { model: "ios 12.0 sy5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0wx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xd", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 m5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea14", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xw", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(27)", }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(6)", }, { model: "ios 12.1 xt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(5)xv1", }, { model: "ios xb", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.1", }, { model: "ios 12.1 t8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(3)", }, { model: "ios 12.0 st5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xg", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(3)", }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1(1.2)", }, { model: "ios 12.1 xg5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 fc1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.1", }, { model: "ios 15.0 m8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 t17", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.2t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xp", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(5)", }, { model: "ios 12.0 wc5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0(3)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(7)xv", }, { model: "ios 12.0 wc4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.6", }, { model: "ios 12.0 t8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 4.0 n2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0ev", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ay", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.4", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(21)", }, { model: "ios 12.0y", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sl", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 eo", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(27)", }, { model: "ios 12.0 sv1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xu1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 aa", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(5)xv", }, { model: "ios 15.1 m2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s2a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc15", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea5a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sy", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xa3", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.1", }, { model: "ios 15.1 m3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.2 t1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 st8", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xl2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(5)xv5", }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1(4)", }, { model: "ios 12.1 ax", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xz7", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea12", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sl2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.3", }, { model: "ios 12.1 ea4a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 e15", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sy10", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s3b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(4)", }, { model: "ios 12.0sc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2.1", }, { model: "nx-os 5.0 n1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0(2)", }, { model: "ios 12.1 t12", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(19)", }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2.8", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(3.2)", }, { model: "nx-os 5.0 u1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xt3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea10a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0w", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xc2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wt6", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.1", }, { model: "ios xd", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.2", }, { model: "ios 12.0 sfx4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sl6", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(20.3)", }, { model: "ios 12.0 xn1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 s11", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(15)", }, { model: "ios 15.2 t2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 t9", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xi4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 da3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(16)", }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.1(1.7)", }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.1", }, { model: "ios xe 3.3.xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wc7", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 w5-32a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sz4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(12)", }, { model: "ios 12.0 w5-27d", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0wt", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.1(1)", }, { model: "ios 15.0 m7", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sl9", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ev01", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os 4.2 n2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "5.0", }, { model: "ios 12.1 xz", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(4)", }, { model: "ios 12.0 wc2b", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 xm", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(19)", }, { model: "ios 12.0 s14", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe", scope: "eq", trust: 0.3, vendor: "cisco", version: "3.4", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(5)xv4", }, { model: "ios xe 3.6.0s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 e13", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xs2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.0", }, { model: "ios 12.1 t15", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sl1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe 3.5.0s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(17)", }, { model: "ios 12.0t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xm7", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 m2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.3", }, { model: "ios 12.0 wc5a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.0 m4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sc3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 15.2 t", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "des-3800", scope: "eq", trust: 0.3, vendor: "d link", version: "0", }, { model: "ios 12.0 db2", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 xm6", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(26)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0.3", }, { model: "ios 12.1 ea8a", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios xe 3.4.2s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "2.2", }, { model: "ios 12.0 wc3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(5)", }, { model: "firewall services module", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.1", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(10)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(9)", }, { model: "ios 12.1 t5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 st3", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 sl4", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0db", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0 wx5", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0xs", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ay1", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.1(2)", }, { model: "ios xe 3.5.1s", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "nx-os", scope: "eq", trust: 0.3, vendor: "cisco", version: "4.2(3)", }, { model: "ios", scope: "eq", trust: 0.3, vendor: "cisco", version: "12.0(12)", }, { model: "ios 12.0dc", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.1 ea10", scope: null, trust: 0.3, vendor: "cisco", version: null, }, { model: "ios 12.0sx", scope: null, trust: 0.3, vendor: "cisco", version: null, }, ], sources: [ { db: "CERT/CC", id: "VU#229804", }, { db: "CNVD", id: "CNVD-2013-11490", }, { db: "BID", id: "61566", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, { db: "NVD", id: "CVE-2013-0149", }, { db: "CNNVD", id: "CNNVD-201308-057", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(05\\)wc8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20.4\\)sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5-27d:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.6\\)w5\\(9.0.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(32\\)sy9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)w5\\(22b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24.2\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-32a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(33\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(33\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(32\\)s13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)e5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)st7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)sy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)s2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-30b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.4\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(32\\)s12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(32\\)sy8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)eb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10.5\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ev01:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1.3\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)e4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19.3\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)fc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(15\\)bc1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ex2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13.4\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)e7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)e6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e18:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ew4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)cx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(12\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6.5\\)ec3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea2b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(13\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(19\\)st:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(15\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(20\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc11:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s4a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)s5a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(22\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(21\\)sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(25.4\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5\\(31a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(31\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(30\\)s4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(3.3\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5a\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11a\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11.5\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(1a\\)t1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(18.4\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(19\\)e6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)e9:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(13\\)ay:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(11\\)ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(7\\)da3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)aa1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e16:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1x\\(l\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)e3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.1.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.3.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.4.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.1sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.2.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.3.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.3.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.2.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.0sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.4.3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:2.4.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:7.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:8.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:9.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:8.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:8.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:7.2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:9.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:8.0\\(2\\):*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:9.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:cisco:staros:14.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:cisco:fwsm:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2013-0149", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Dr. Gabi Nakibly from Rafael Advanced Defense Systems as joint work he conducted with Eitan Menahem, Yuval Elovici and Ariel Waizel of Telekom Innovation Laboratories at Ben Gurion University", sources: [ { db: "BID", id: "61566", }, ], trust: 0.3, }, cve: "CVE-2013-0149", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, impactScore: 4.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: false, vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "MEDIUM", accessVector: "ADJACENT NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", availabilityRequirement: "HIGH", baseScore: 5.4, collateralDamagePotential: "MEDIUM-HIGH", confidentialityImpact: "PARTIAL", confidentialityRequirement: "NOT DEFINED", enviromentalScore: 5.1, exploitability: "PROOF-OF-CONCEPT", exploitabilityScore: 5.5, id: "CVE-2013-0149", impactScore: 6.4, integrityImpact: "PARTIAL", integrityRequirement: "NOT DEFINED", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, remediationLevel: "OFFICIAL FIX", reportConfidence: "CONFIRMED", severity: "MEDIUM", targetDistribution: "MEDIUM", trust: 0.8, userInterationRequired: null, vector_string: "AV:A/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5.8, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2013-0149", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "NONE", exploitabilityScore: 8.6, id: "CNVD-2013-11490", impactScore: 4.9, integrityImpact: "PARTIAL", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULHUB", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "VHN-60151", impactScore: 4.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.1, vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:P", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2013-0149", trust: 2.6, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2013-11490", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201308-057", trust: 0.6, value: "MEDIUM", }, { author: "VULHUB", id: "VHN-60151", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CERT/CC", id: "VU#229804", }, { db: "CNVD", id: "CNVD-2013-11490", }, { db: "VULHUB", id: "VHN-60151", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, { db: "NVD", id: "CVE-2013-0149", }, { db: "CNNVD", id: "CNNVD-201308-057", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795. Open Shortest Path First (OSPF) The protocol specifications include: Link State Advertisement (LSA) There is a problem with the identification of. OSPF Specified in the protocol LSA Is LS Type , Advertising Router and Link State ID is included. OSPF In the provisions of router-LSA of Link State ID When Advertising Router Are supposed to be set to the same value. These two values are different, crafted router-LSA The contents of the routing table may be altered by receiving.The expected impact varies depending on each product and implementation. (DoS) An attacker may be able to attack you or direct network traffic to another router. OSPF is a routing protocol defined by RFC 2328 and is designed to manage IP routes in an AS. OSPF packets use the 89 IP protocol number. A vulnerability exists in the related OSPF routing protocol LSA database. Several Cisco products are affected by this vulnerability. This vulnerability allows unverified attackers to fully control the OSPF AS domain routing table, discard blackhole traffic, and intercept communications, which can lead to denial of service attacks. An attacker can inject a specially crafted OSPF packet to trigger the vulnerability. Successful exploitation of the vulnerability can \\\"clean\\\" the routing table on the target router and propagate the specially crafted OSPF LSA type 1 update to the entire OSPF AS domain. To exploit this vulnerability, an attacker must accurately determine certain parameters in the LSA data on the target router. This vulnerability can only be triggered by sending a specially crafted unicast or multicast LSA type 1 message. The other LSA type packets cannot trigger the vulnerability. The OSPFv3 and Fabric Shortest Path First (FSPF) protocols do not affect this vulnerability. This may aid in further attacks. IOS, IOS-XE, and NX-OS are all operating systems developed for their network devices. Both ASA and FWSM are firewall devices. The following products and versions are affected: Cisco IOS Releases 12.0 to 12.4 and 15.0 to 15.3, IOS-XE Releases 2.x to 3.9.xS, ASA and PIX Releases 7.x to 9.1, FWSM, NX-OS, StarOS 14.0. Versions prior to 50488", sources: [ { db: "NVD", id: "CVE-2013-0149", }, { db: "CERT/CC", id: "VU#229804", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, { db: "CNVD", id: "CNVD-2013-11490", }, { db: "BID", id: "61566", }, { db: "VULHUB", id: "VHN-60151", }, ], trust: 3.24, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2013-0149", trust: 4.2, }, { db: "CERT/CC", id: "VU#229804", trust: 2.7, }, { db: "BID", id: "61566", trust: 1, }, { db: "JVN", id: "JVNVU96465452", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2013-003639", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-201308-057", trust: 0.7, }, { db: "CNVD", id: "CNVD-2013-11490", trust: 0.6, }, { db: "CISCO", id: "20130801 OSPF LSA MANIPULATION VULNERABILITY IN MULTIPLE CISCO PRODUCTS", trust: 0.6, }, { db: "VULHUB", id: "VHN-60151", trust: 0.1, }, ], sources: [ { db: "CERT/CC", id: "VU#229804", }, { db: "CNVD", id: "CNVD-2013-11490", }, { db: "VULHUB", id: "VHN-60151", }, { db: "BID", id: "61566", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, { db: "NVD", id: "CVE-2013-0149", }, { db: "CNNVD", id: "CNNVD-201308-057", }, ], }, id: "VAR-201308-0052", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2013-11490", }, { db: "VULHUB", id: "VHN-60151", }, ], trust: 1.3929784875, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2013-11490", }, ], }, last_update_date: "2023-12-18T12:08:53.471000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "29974", trust: 0.8, url: "http://tools.cisco.com/security/center/viewambalert.x?alertid=29974", }, { title: "OSPF LSA Manipulation Vulnerability in Multiple Cisco Products (cisco-sa-20130801-lsaospf)", trust: 0.8, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130801-lsaospf", }, { title: "2013-07 Out of Cycle Security Bulletin: Multiple products: OSPF protocol vulnerability (CVE-2013-0149)", trust: 0.8, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10582", }, { title: "NV13-006", trust: 0.8, url: "http://jpn.nec.com/security-info/secinfo/nv13-006.html", }, { title: "Oracle Critical Patch Update Advisory - October 2013", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", }, { title: "Text Form of Oracle Critical Patch Update - October 2013 Risk Matrices", trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpuoct2013verbose-1899842.html", }, { title: "RFCの記述の不整合を起因とするOSPFv2の脆弱性(VU#229804)について", trust: 0.8, url: "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu96465452.html", }, { title: "October 2013 Critical Patch Update Released", trust: 0.8, url: "https://blogs.oracle.com/security/entry/october_2013_critical_patch_update", }, { title: "30210", trust: 0.8, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=30210", }, { title: "OSPF LSA Manipulation Vulnerability in Multiple Cisco Products (cisco-sa-20130801-lsaospf)", trust: 0.8, url: "http://www.cisco.com/cisco/web/support/jp/111/1119/1119243_cisco-sa-20130801-lsaospf-j.html", }, { title: "Multiple Cisco product remote security bypass vulnerability patches", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/38006", }, ], sources: [ { db: "CNVD", id: "CNVD-2013-11490", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, ], sources: [ { db: "NVD", id: "CVE-2013-0149", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.3, url: "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130801-lsaospf", }, { trust: 1.9, url: "http://www.kb.cert.org/vuls/id/229804", }, { trust: 1.6, url: "http://tools.ietf.org/html/rfc2328", }, { trust: 0.8, url: "http://en.wikipedia.org/wiki/open_shortest_path_first", }, { trust: 0.8, url: "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk94490", }, { trust: 0.8, url: "http://tools.cisco.com/security/center/viewalert.x?alertid=30210", }, { trust: 0.8, url: "https://cp-enterasys.kb.net/article.aspx?article=15134&p=1", }, { trust: 0.8, url: "http://www-01.ibm.com/support/docview.wss?uid=isg3t1019716", }, { trust: 0.8, url: "http://kb.juniper.net/infocenter/index?page=content&id=jsa10582&cat=sirt_1&actp=", }, { trust: 0.8, url: "http://jpn.nec.com/security-info/secinfo/nv13-006.html", }, { trust: 0.8, url: "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", }, { trust: 0.8, url: "http://www.rtpro.yamaha.co.jp/rt/faq/security/vu96465452.html", }, { trust: 0.8, url: "https://kc.mcafee.com/corporate/index?page=content&id=kb79309&actp=list", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0149", }, { trust: 0.8, url: "http://jvn.jp/cert/jvnvu96465452/index.html", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0149", }, { trust: 0.6, url: "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscug34485", }, { trust: 0.6, url: "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscug34469", }, { trust: 0.6, url: "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscug39762", }, { trust: 0.6, url: "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscug63304", }, { trust: 0.6, url: "http://tools.cisco.com/support/bugtoolkit/search/getbugdetails.do?method=fetchbugdetails&bugid=cscug39795", }, { trust: 0.3, url: "http://www.cisco.com", }, ], sources: [ { db: "CERT/CC", id: "VU#229804", }, { db: "CNVD", id: "CNVD-2013-11490", }, { db: "VULHUB", id: "VHN-60151", }, { db: "BID", id: "61566", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, { db: "NVD", id: "CVE-2013-0149", }, { db: "CNNVD", id: "CNNVD-201308-057", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CERT/CC", id: "VU#229804", }, { db: "CNVD", id: "CNVD-2013-11490", }, { db: "VULHUB", id: "VHN-60151", }, { db: "BID", id: "61566", }, { db: "JVNDB", id: "JVNDB-2013-003639", }, { db: "NVD", id: "CVE-2013-0149", }, { db: "CNNVD", id: "CNNVD-201308-057", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2013-08-02T00:00:00", db: "CERT/CC", id: "VU#229804", }, { date: "2013-08-05T00:00:00", db: "CNVD", id: "CNVD-2013-11490", }, { date: "2013-08-05T00:00:00", db: "VULHUB", id: "VHN-60151", }, { date: "2013-08-01T00:00:00", db: "BID", id: "61566", }, { date: "2013-08-06T00:00:00", db: "JVNDB", id: "JVNDB-2013-003639", }, { date: "2013-08-05T13:22:47.847000", db: "NVD", id: "CVE-2013-0149", }, { date: "2013-08-07T00:00:00", db: "CNNVD", id: "CNNVD-201308-057", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2013-12-06T00:00:00", db: "CERT/CC", id: "VU#229804", }, { date: "2013-08-05T00:00:00", db: "CNVD", id: "CNVD-2013-11490", }, { date: "2013-08-13T00:00:00", db: "VULHUB", id: "VHN-60151", }, { date: "2014-08-05T00:29:00", db: "BID", id: "61566", }, { date: "2013-10-23T00:00:00", db: "JVNDB", id: "JVNDB-2013-003639", }, { date: "2013-08-13T17:18:34.893000", db: "NVD", id: "CVE-2013-0149", }, { date: "2013-08-12T00:00:00", db: "CNNVD", id: "CNNVD-201308-057", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-201308-057", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Open Shortest Path First (OSPF) Protocol does not specify unique LSA lookup identifiers", sources: [ { db: "CERT/CC", id: "VU#229804", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Input Validation Error", sources: [ { db: "BID", id: "61566", }, ], trust: 0.3, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.