From f67a36e9f93db2d152e067276c2b45e0055b56ea Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 30 Jun 2025 16:03:47 +0000 Subject: [PATCH] Auto-Update: 2025-06-30T16:00:11.385363+00:00 --- CVE-2023/CVE-2023-460xx/CVE-2023-46012.json | 43 +- CVE-2023/CVE-2023-473xx/CVE-2023-47310.json | 29 + CVE-2024/CVE-2024-203xx/CVE-2024-20308.json | 5116 ++++++++++++++++++- CVE-2024/CVE-2024-203xx/CVE-2024-20312.json | 4091 ++++++++++++++- CVE-2024/CVE-2024-233xx/CVE-2024-23335.json | 64 +- CVE-2024/CVE-2024-233xx/CVE-2024-23336.json | 64 +- CVE-2024/CVE-2024-280xx/CVE-2024-28056.json | 74 +- CVE-2024/CVE-2024-288xx/CVE-2024-28871.json | 61 +- CVE-2024/CVE-2024-290xx/CVE-2024-29007.json | 50 +- CVE-2024/CVE-2024-290xx/CVE-2024-29008.json | 40 +- CVE-2024/CVE-2024-302xx/CVE-2024-30256.json | 44 +- CVE-2024/CVE-2024-337xx/CVE-2024-33775.json | 53 +- CVE-2024/CVE-2024-360xx/CVE-2024-36048.json | 113 +- CVE-2024/CVE-2024-363xx/CVE-2024-36383.json | 44 +- CVE-2024/CVE-2024-407xx/CVE-2024-40750.json | 80 +- CVE-2024/CVE-2024-472xx/CVE-2024-47226.json | 32 +- CVE-2024/CVE-2024-482xx/CVE-2024-48286.json | 38 +- CVE-2024/CVE-2024-536xx/CVE-2024-53621.json | 25 + CVE-2024/CVE-2024-547xx/CVE-2024-54772.json | 43 +- CVE-2024/CVE-2024-549xx/CVE-2024-54952.json | 26 +- CVE-2024/CVE-2024-569xx/CVE-2024-56915.json | 43 +- CVE-2024/CVE-2024-569xx/CVE-2024-56916.json | 39 +- CVE-2024/CVE-2024-569xx/CVE-2024-56917.json | 39 +- CVE-2024/CVE-2024-569xx/CVE-2024-56918.json | 43 +- CVE-2025/CVE-2025-242xx/CVE-2025-24290.json | 18 +- CVE-2025/CVE-2025-28xx/CVE-2025-2895.json | 56 + CVE-2025/CVE-2025-328xx/CVE-2025-32897.json | 33 +- CVE-2025/CVE-2025-455xx/CVE-2025-45529.json | 31 +- CVE-2025/CVE-2025-460xx/CVE-2025-46014.json | 47 +- CVE-2025/CVE-2025-69xx/CVE-2025-6908.json | 10 +- CVE-2025/CVE-2025-69xx/CVE-2025-6911.json | 149 + CVE-2025/CVE-2025-69xx/CVE-2025-6912.json | 145 + README.md | 57 +- _state.csv | 89 +- 34 files changed, 10725 insertions(+), 204 deletions(-) create mode 100644 CVE-2023/CVE-2023-473xx/CVE-2023-47310.json create mode 100644 CVE-2024/CVE-2024-536xx/CVE-2024-53621.json create mode 100644 CVE-2025/CVE-2025-28xx/CVE-2025-2895.json create mode 100644 CVE-2025/CVE-2025-69xx/CVE-2025-6911.json create mode 100644 CVE-2025/CVE-2025-69xx/CVE-2025-6912.json diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json index 86914404bb5..ba7d4b08066 100644 --- a/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46012.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46012", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.003", - "lastModified": "2025-03-14T02:15:12.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:13:28.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:ea7500_v3_firmware:3.0.1.207964:*:*:*:*:*:*:*", + "matchCriteriaId": "F2C31082-BA9E-453B-BFFC-2D0EAEE2AF3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:ea7500_v3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F3CEDE6-9138-4ED8-B26A-0111AFDE3F9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dest-3/CVE-2023-46012/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/dest-3/CVE-2023-46012/tree/main", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-473xx/CVE-2023-47310.json b/CVE-2023/CVE-2023-473xx/CVE-2023-47310.json new file mode 100644 index 00000000000..ab1c087c91d --- /dev/null +++ b/CVE-2023/CVE-2023-473xx/CVE-2023-47310.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2023-47310", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-30T15:15:22.493", + "lastModified": "2025-06-30T15:15:22.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A misconfiguration in the default settings of MikroTik RouterOS 7 and fixed in v7.14 allows incoming IPv6 UDP traceroute packets." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://mikrotik.com", + "source": "cve@mitre.org" + }, + { + "url": "http://routeros.com", + "source": "cve@mitre.org" + }, + { + "url": "https://forum.mikrotik.com/t/fixed-in-7-14-security-vulnerability-default-configuration-firewall-bypass-for-ipv6-udp/262186", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json index c341dbf6c8e..0fe98fbdff4 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20308", "sourceIdentifier": "psirt@cisco.com", "published": "2024-03-27T18:15:09.853", - "lastModified": "2024-11-26T16:15:12.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:13:39.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,14 +71,5102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md:*:*:*:*:*:*:*", + "matchCriteriaId": "498A43E2-5A03-46C9-B60D-8E7CE79F1705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md1:*:*:*:*:*:*:*", + "matchCriteriaId": "B003515C-B9DD-40D7-9F7E-97AE5FDC984F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)md2:*:*:*:*:*:*:*", + "matchCriteriaId": "D83AF6ED-1704-48B4-B5E4-E32CF0DF07FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda:*:*:*:*:*:*:*", + "matchCriteriaId": "6EB30791-A691-42DD-8714-B173242EDBBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda1:*:*:*:*:*:*:*", + "matchCriteriaId": "E61B059C-5457-42D2-BE37-559B36E7865B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda2:*:*:*:*:*:*:*", + "matchCriteriaId": "50B87F96-2F12-43C4-BABE-13C864838E5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda3:*:*:*:*:*:*:*", + "matchCriteriaId": "A8FCAE0E-F871-4F65-82F2-4690D345298B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda4:*:*:*:*:*:*:*", + "matchCriteriaId": "72F162DF-8131-40A6-BC47-0A71CDD96D49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda5:*:*:*:*:*:*:*", + "matchCriteriaId": "9D982FA3-6473-46A7-8F16-17D7FCE33551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda6:*:*:*:*:*:*:*", + "matchCriteriaId": "37B94C23-763C-4249-AE16-97D17124F5B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "2BD17B45-17BC-43BD-A180-AACEE0888D24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "039F72C1-FCA3-4403-90A0-C4B507D9A85C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B83D2BE-762D-4D74-B9C4-BF765DCF31B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "874F3BFC-CC93-42C6-A168-ED554AB1713C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "4479287A-64FD-40A3-8C92-2C52FD902F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3D5843-A77C-42AB-9A3F-F8F18E2854C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr1:*:*:*:*:*:*:*", + "matchCriteriaId": "8A422DC5-DBED-447C-8E1F-BE75B70EF677" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr2:*:*:*:*:*:*:*", + "matchCriteriaId": "E7837CF7-9CAD-4650-901F-587E3F2F5694" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr3:*:*:*:*:*:*:*", + "matchCriteriaId": "905571F1-D7E7-4266-9DEB-AD45C4EFDA82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr4:*:*:*:*:*:*:*", + "matchCriteriaId": "68DD52B2-811C-4599-8DAF-B990BF6F4135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr5:*:*:*:*:*:*:*", + "matchCriteriaId": "BA7F96A8-8F7B-417F-93E0-9780E9199A19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr6:*:*:*:*:*:*:*", + "matchCriteriaId": "6354ECE9-4B45-4998-BEA9-4F1740FD3759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr7:*:*:*:*:*:*:*", + "matchCriteriaId": "2FFD59CA-9FB4-4C63-B776-719DCDAC5B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr8:*:*:*:*:*:*:*", + "matchCriteriaId": "AC0E49AF-FEF7-4749-A648-AB2D3F784F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr9:*:*:*:*:*:*:*", + "matchCriteriaId": "13E6F41A-6C48-415D-8CD2-C73421693158" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr10:*:*:*:*:*:*:*", + "matchCriteriaId": "F136F045-6B90-4E37-9CDF-D84050DD175E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr11:*:*:*:*:*:*:*", + "matchCriteriaId": "AFCCCF8A-ADDE-4E67-B9A1-DEBE6C5E4687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr12:*:*:*:*:*:*:*", + "matchCriteriaId": "63B3E0D4-B335-4597-A482-F60A2C7BF90E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md:*:*:*:*:*:*:*", + "matchCriteriaId": "539454C8-EA90-4146-9429-72465CF555FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md1:*:*:*:*:*:*:*", + "matchCriteriaId": "4E44F5F4-D7FE-4B9C-BA65-2365EF7A8092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md2:*:*:*:*:*:*:*", + "matchCriteriaId": "9548BCBF-0E01-41F8-A6BA-D70032340C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md3:*:*:*:*:*:*:*", + "matchCriteriaId": "B9BF1BB8-EAB1-46C9-BD36-73E502619C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md4:*:*:*:*:*:*:*", + "matchCriteriaId": "34F23388-1B0B-4708-85F4-5A8B7359C1B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md5:*:*:*:*:*:*:*", + "matchCriteriaId": "F6728EA8-00AC-4BE1-AA48-22D8AA861532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md6:*:*:*:*:*:*:*", + "matchCriteriaId": "10090F0A-645B-451E-ABAA-57DCA9C081E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)md7:*:*:*:*:*:*:*", + "matchCriteriaId": "B87BBFE8-2D55-4CDF-B624-6B509411945B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda1:*:*:*:*:*:*:*", + "matchCriteriaId": "CD74F179-FDAB-465D-80D5-65711B34D12C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda2:*:*:*:*:*:*:*", + "matchCriteriaId": "94615285-655F-436B-A967-D8FFCF4B7794" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda3:*:*:*:*:*:*:*", + "matchCriteriaId": "491BFBBE-1B48-4F58-96BA-E0B065DF2BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda4:*:*:*:*:*:*:*", + "matchCriteriaId": "59F2AFD4-D5D6-4D4F-9085-6869738B56B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda5:*:*:*:*:*:*:*", + "matchCriteriaId": "D794DE0F-12BF-421E-8E5A-A505501EA0F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda6:*:*:*:*:*:*:*", + "matchCriteriaId": "EF65A6E8-8D58-4537-8AE6-DE4A72FF3A58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda7:*:*:*:*:*:*:*", + "matchCriteriaId": "9622A8CF-0C0A-4CED-B469-CAA868970323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda8:*:*:*:*:*:*:*", + "matchCriteriaId": "A9746F30-F1AD-4643-8BAD-6FD049B7536F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda9:*:*:*:*:*:*:*", + "matchCriteriaId": "C533F5D8-9C23-4D7E-8C58-56B65AD76AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda10:*:*:*:*:*:*:*", + "matchCriteriaId": "CB531CBC-8EE0-46B0-88C5-2362837729E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda11:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4485F3-AF11-4E2D-AF01-8243D9C8A851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda12:*:*:*:*:*:*:*", + "matchCriteriaId": "F4433412-E849-4040-BAA5-1CE9CE17B924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda13:*:*:*:*:*:*:*", + "matchCriteriaId": "4E9B1DF0-A3D9-4AFD-9305-C156A8CB101C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb:*:*:*:*:*:*:*", + "matchCriteriaId": "1591B1A2-15AB-4226-B0E3-AEA84D0A7928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb1:*:*:*:*:*:*:*", + "matchCriteriaId": "B2D85C68-9A72-4C6F-89C4-CAACFAE7C76A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb3:*:*:*:*:*:*:*", + "matchCriteriaId": "B0CA4EEA-9AE8-4F5A-9FDF-A6CFA503ADF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb4:*:*:*:*:*:*:*", + "matchCriteriaId": "0532182F-A3BB-42EF-A2E5-B3B1C092335B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb5:*:*:*:*:*:*:*", + "matchCriteriaId": "DD686C04-03E3-409B-B92A-D9177924340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb5a:*:*:*:*:*:*:*", + "matchCriteriaId": "32A7C36F-FC21-4BEA-920F-9F3F9CA76C78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb6:*:*:*:*:*:*:*", + "matchCriteriaId": "74487E59-3809-4054-89CA-ED7900A793A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb7:*:*:*:*:*:*:*", + "matchCriteriaId": "B9B174D7-FE10-4416-9572-CE00FF580A5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb8:*:*:*:*:*:*:*", + "matchCriteriaId": "BE654FD0-AC27-49B7-91FD-8F15FE78E97B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb9:*:*:*:*:*:*:*", + "matchCriteriaId": "AB46CA20-CDCA-495E-A4DB-5BDB9AC5BC82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb10:*:*:*:*:*:*:*", + "matchCriteriaId": "A9C02086-1473-403B-97AF-8500104E6C96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb11:*:*:*:*:*:*:*", + "matchCriteriaId": "ED2ED2BA-9D3E-412B-86C2-2A0E9588E84D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb12:*:*:*:*:*:*:*", + "matchCriteriaId": "9AC9CBDA-AFED-45E7-91CC-8AFD887122D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb13:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA93FA2-0C10-4809-8EE3-3445DC5B1E05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb14:*:*:*:*:*:*:*", + "matchCriteriaId": "1ED0CFC4-95B0-420B-B6C2-EB953B93628F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb15:*:*:*:*:*:*:*", + "matchCriteriaId": "3E24E081-FF09-4569-B83C-C46F390CD6A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb16:*:*:*:*:*:*:*", + "matchCriteriaId": "50FB8B6D-69F6-4619-8F76-0EB92C785F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb17:*:*:*:*:*:*:*", + "matchCriteriaId": "BF02D7D8-124C-4CE8-BF32-D6C7851B3B8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb18:*:*:*:*:*:*:*", + "matchCriteriaId": "45D741B6-6599-4209-9D6C-06570FBF4B66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb19:*:*:*:*:*:*:*", + "matchCriteriaId": "CA97E52D-1053-4704-B404-B85B99F46CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "4A9C9B9C-2064-4130-95B9-5BCE4BB97789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "2A6AD6E5-EBB0-44D8-A63C-EFF7260E4CC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8B1B14-6FCA-423D-B49B-D07624DAE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "E88A1ADC-A53A-407F-80F7-A0EF5359DDAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3e:*:*:*:*:*:*:*", + "matchCriteriaId": "775CF994-36BE-4456-99CD-1FDEA5CC9B30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3f:*:*:*:*:*:*:*", + "matchCriteriaId": "766668CA-B5BF-4D80-811E-B2E6396AC6BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "7937F33C-95A5-4D38-B574-1B04051DC10A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4a:*:*:*:*:*:*:*", + "matchCriteriaId": "5AF7258F-C4A4-4E56-88B0-CF1536AEE9F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4b:*:*:*:*:*:*:*", + "matchCriteriaId": "605EC471-A558-4414-B691-1E852EA7EE63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4c:*:*:*:*:*:*:*", + "matchCriteriaId": "53830355-05F7-4A49-A0D9-731F43870F7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4d:*:*:*:*:*:*:*", + "matchCriteriaId": "A5ED4DEB-4DCF-4660-8D4C-059537A5B144" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4e:*:*:*:*:*:*:*", + "matchCriteriaId": "8294E41A-AE2A-4EEA-A932-45CFB294A48C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4f:*:*:*:*:*:*:*", + "matchCriteriaId": "6EC9B0EA-FDF6-49D0-8118-4F336750E473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4l:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB4F895-D790-4A23-ADDF-5EFCA9B86208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "07E00079-3EB8-4FE5-A977-CF78673D7AE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t6:*:*:*:*:*:*:*", + "matchCriteriaId": "E36204F5-1257-4A08-8764-8700C4545FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t7:*:*:*:*:*:*:*", + "matchCriteriaId": "4F288BF4-A550-4807-9C02-F6A93B8D1AAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)t8:*:*:*:*:*:*:*", + "matchCriteriaId": "1B1A64DF-83BF-41CA-839F-72C7E8A9A7A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg:*:*:*:*:*:*:*", + "matchCriteriaId": "1971F3C9-8B6A-4211-94E4-441CC4A963B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg1:*:*:*:*:*:*:*", + "matchCriteriaId": "98963D57-18BE-49D2-A3FF-35E86F3AEF12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg2:*:*:*:*:*:*:*", + "matchCriteriaId": "BE1ED725-DEFC-41CC-AF37-753F506B0690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg3:*:*:*:*:*:*:*", + "matchCriteriaId": "18CD57A0-D85C-4110-B810-4B866475B9A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:12.4\\(24\\)yg4:*:*:*:*:*:*:*", + "matchCriteriaId": "1B6789D8-C2EC-4631-9B72-B645A5C04985" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "B97701A6-F7AE-4D14-A5C1-8F7743256766" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "AB788EFF-FB9E-41BC-B8FD-8EE40F657B47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A801C7F1-7E15-4B40-A2F0-DD181F13DB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "0A735690-4813-486E-929A-2F97F51FDEBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "A6BB6662-6683-4EA7-B2E2-984FB68977AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "5C8720B1-11DF-47E6-90C3-F0D3F77E69D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "50FA81AE-B37E-4F38-ABAD-44EF200FA5CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "3083C5E7-A17A-4744-A700-697FF50B5444" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "3E760F98-3A9B-48BE-83AD-22672B15C619" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "049F7107-B407-4F99-8688-738AF3AF4CBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "97EC3675-6213-4AA2-9C91-73A89AD7D98C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa:*:*:*:*:*:*:*", + "matchCriteriaId": "5350BD36-86A8-4C33-B638-EF287DA8622F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa1:*:*:*:*:*:*:*", + "matchCriteriaId": "E145F9B7-ECAF-432F-B6FB-7CB5EA97B17C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa2:*:*:*:*:*:*:*", + "matchCriteriaId": "FBC60D5E-0005-4FF6-B55E-FE344C9BC58D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa3:*:*:*:*:*:*:*", + "matchCriteriaId": "984EC0F5-F270-470C-A959-919B0B7A7B26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa4:*:*:*:*:*:*:*", + "matchCriteriaId": "57726EE6-38B3-4F1F-8DFF-0891C85395A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa5:*:*:*:*:*:*:*", + "matchCriteriaId": "017CDE22-7CC3-4EB6-9131-ABBD5F3FC0DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*", + "matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*", + "matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*", + "matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*", + "matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*", + "matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*", + "matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", + "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*", + "matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*", + "matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", + "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*", + "matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*", + "matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*", + "matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*", + "matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*", + "matchCriteriaId": "8422A740-0029-4C05-A7FE-12F12CD73B0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*", + "matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*", + "matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*", + "matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*", + "matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*", + "matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*", + "matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*", + "matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*", + "matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", + "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*", + "matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*", + "matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*", + "matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*", + "matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*", + "matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*", + "matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*", + "matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "C90EADDB-435F-4965-8064-E3D102139053" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "4D255E7E-037D-4926-8791-55B962AAA1E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "7F79E255-6198-4251-92C8-90A797F65DF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*", + "matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*", + "matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*", + "matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "5AD483E0-66F9-4DD1-85FA-C125C9617E10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "35C1075B-11F3-453C-957D-834C5D6D8CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "115E901C-94B4-4EC7-AA85-03A20CFA90DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "C97051EE-8C42-4546-8EDC-FAD60B3EE1EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "FB435D9A-FA6C-4CBD-8647-3A61B3DAB338" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "14181F4B-9A5C-40B4-BD15-FED694E9AE8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "B62E402E-5D8B-4261-906C-C5668B4A12BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "85017D3F-5CEF-48BA-847E-7DCB39AC7636" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "2D4DD419-4BA3-4E3F-935C-2A6C9C71BD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "277D20C6-DAD1-455F-91E8-E5E091C1E7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2B33D730-0E80-46AF-8B53-FCEFF457EBAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "BF2D383F-F5A1-4BF6-9334-356E3CEEE897" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "E3AE0230-D1A0-4A9E-A0A3-037C7977D450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)xb:*:*:*:*:*:*:*", + "matchCriteriaId": "F7ACB559-F6D1-49B9-A76F-7DCAC88F802B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "3CF70487-4E51-4570-927B-1B74D73E9D58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "242A4DC2-C9C7-4ACB-99F0-317959B0CA2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4ECF5C-1B91-4B54-BAB4-2DF17A1BBF56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "241590D8-0230-4504-BD8D-815C8BC1F0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF1AB59-AC63-49AC-9A5B-8D8987A9E3F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB7A4D4-ADF6-4845-8B5E-A432BF52F0D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*", + "matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*", + "matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*", + "matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*", + "matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*", + "matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*", + "matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "07DCF559-9324-4CE1-A986-EF4A174DCEFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "38CC9728-4E4A-4536-BC81-031AFE1A74E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "F9DECC49-1DF8-4925-9232-04DA748428B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "B736A1E0-89F4-418C-BC12-7E6A7AC7891F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "2BDC0B5A-E59C-454E-AA0E-6EB9C8888480" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2363876E-0E3B-44BA-8157-FA96554302B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D3131A-74F7-4465-826E-5F6C90240C4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0D1E17-9A5C-4B74-B780-F31364FD9F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "F70ADF53-D937-4CB1-8D17-8B4DB9A5458C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0F30A4-C088-4ECC-ABE0-33D4A7BC8D1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*", + "matchCriteriaId": "73B11B78-1936-42CA-919E-BCD1E0C2A397" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*", + "matchCriteriaId": "A807560F-7111-40AB-BCC8-F3D7A2F92D2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE56D89-5894-49E9-BDCF-E23AE4159989" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*", + "matchCriteriaId": "EC9347AF-7729-44BD-8E33-610D573C560F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*", + "matchCriteriaId": "14DC014A-2CDD-4294-8AEB-9C0B437C1633" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*", + "matchCriteriaId": "B9AB472D-2158-44DC-A627-8C4D52F476A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*", + "matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy16:*:*:*:*:*:*:*", + "matchCriteriaId": "AC27EED6-7F43-422F-8E61-CDD4E9EDC719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "5D14775C-95F5-4507-9837-CA818489CF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*", + "matchCriteriaId": "A9895119-8DE1-4D27-A5B6-5FFA46A9B8C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "43CDBE37-FFAF-4EB1-834B-6972D16FA222" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "FFC3E04D-52F8-4C36-9B6C-086FD3BFFD2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2a:*:*:*:*:*:*:*", + "matchCriteriaId": "B6FE3400-AF89-4A5F-AFF5-3521B1CC1AA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "014EEE0B-4158-49F1-B2B1-692FF481991F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "5A3D239A-CB65-46BA-8048-73439B8DA3E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t5:*:*:*:*:*:*:*", + "matchCriteriaId": "E2A3D04B-CA03-4CAF-8AE6-44B89DDAA104" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra:*:*:*:*:*:*:*", + "matchCriteriaId": "A476A597-31B0-4793-A7DA-174F453691D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra1:*:*:*:*:*:*:*", + "matchCriteriaId": "A48DC394-BBFC-441B-A50C-126AAC0698CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra2:*:*:*:*:*:*:*", + "matchCriteriaId": "944D5FAB-0DE1-4B77-906F-BBD661C316F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*", + "matchCriteriaId": "C71593C6-B365-47D2-958D-A99FFB64101A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra4:*:*:*:*:*:*:*", + "matchCriteriaId": "921D7302-58F2-4033-B3AF-1214F0CE7E4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "A744D47A-1D42-4A98-8120-F1DFC5FD60C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "80003271-E86E-48B3-9D06-1484414116C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "A2B70AC2-A5D6-48C2-AA0E-6B2C9B526264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "0ABF43C0-7BAC-4EF6-9772-B5E59656C758" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "8EE3AD11-6E9B-43B2-96E0-14D80F4AF25F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "ADA33681-4F59-4F5C-ADEB-7AD7776427D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "83F0C310-0851-4E83-B893-FD4FF1DE2E66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s5a:*:*:*:*:*:*:*", + "matchCriteriaId": "606E2317-C625-4CDF-BF03-BCA49E7659B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "6D2A3707-FF8D-4A5B-B0C5-5609ECD229F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "855B1020-7FB6-46D1-ABAF-5618590CF329" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DDD05CF-2C4D-484D-AEB0-C5C28F432A7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "485923CB-D5BD-400D-8324-3FA94D11C4C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "A99DA1B7-18E9-43CF-BD77-050B971D75FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "75634752-042C-4E27-972E-E0D5DCD38BE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "1CD00484-39D2-4CD5-ABEA-3C5AD9977BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "5AAD9B95-0D54-49CA-824D-68175D6B4A8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "B082C941-CE02-440F-8DD7-87873504B964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "8DEBAA67-9C88-48CE-88F7-4B5463B87B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "2B71E784-53C0-46AE-AB6E-9B4CB5FAFFFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "6777AC09-8BA9-4595-89C2-1EAD0310B78B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "C4334D40-9B30-483E-9154-E0956D8849A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "F14897FA-0E55-425C-9048-5987A0A6CE17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C4BCB9-8FE1-4B69-8245-F0F2955CAA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "112C4EA9-2FB4-4C2F-B550-036FCC289DFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B770E747-517E-42FE-9197-8E654F294B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "B59D6811-BF02-436B-808A-DF21682561CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "7BE752C6-250E-47CE-93EA-536958874386" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "71B3103F-9381-40A5-A7BD-D1251B3EA5A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "B990E413-C863-4613-803F-1E492982C70C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", + "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "98EB6A3F-DDAB-4FC6-A857-6E106E815505" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "7741D6E0-2507-44D9-8476-AE11DADEC611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "0318BB57-8001-4F2A-954C-AD8DB2A94356" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF56A5C-3370-4F64-9F2D-F003B8536CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "78159F0B-2553-41F7-9ABA-38065EB5B23E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "46DC8876-9FC4-451A-996F-71F2B1C35781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE57C85-794E-405B-841F-A806D32C08EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*", + "matchCriteriaId": "7B91687C-A8F8-45FB-BF03-8534E9230AB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "E082DB05-253F-4C6F-BD0A-524699309D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B43D4858-AE1C-4372-97F9-5983EEE6ED4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "9678A6F2-0624-4A8A-9991-9DADCDDB2687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC0B809-72AD-413F-BE84-73FE2DB33950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "5F2834B6-AA9D-4FDC-A228-CED66C799849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "B3426024-7199-4B7B-90CB-CE83FD2E0878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "BF163F6F-1A6D-4AA9-AAC2-52249BB28421" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "CD250CC8-B26A-424E-A737-97F2A7E7C4CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", + "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*", + "matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*", + "matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", + "matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", + "matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", + "matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "C89D14BC-1718-4AE9-B107-1709C2CE965E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "DC422D76-8337-41F0-98AE-E5D85DF4D0DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CCA5C4-3683-46C9-801B-683E194DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "27D4C7E2-F1F1-43BF-A53E-2A8FF408F4A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "B05373F4-E820-4D22-A86A-904854F04C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "4C38969D-65EB-4C80-BB2A-A1245C4E718B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "A429CFF2-A288-4CD5-9C06-8D18647C67E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "AB3A9655-9E22-4AEA-BBCF-6C0749D0289E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "D80852CE-8D91-4E85-A97F-C7A9AF5278CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "AF777880-43BF-4D4A-9BA1-B2E925B5DE11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*", + "matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*", + "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10e:*:*:*:*:*:*:*", + "matchCriteriaId": "CD7EF09E-2D74-4B05-B36E-263E35448FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", + "matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", + "matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", + "matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", + "matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", + "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", + "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", + "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*", + "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", + "matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", + "matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "E3714E18-9A21-4D04-BB5E-0299AF443E2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "F6FE61C7-3B61-4085-AD91-137459DA29D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "71080D8B-BC81-4CDF-8626-D0F35DA40AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*", + "matchCriteriaId": "CF10596D-457A-4DA8-8037-5E92E1D39232" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "A37D2CBE-2B93-45CB-AB59-AFDF14277E4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "E2911989-D074-42DF-AB58-6849B3E0B72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "34299D29-96EC-4AAA-8137-49B292FC2D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "5092DFCF-FEE9-4BE3-9116-01F3CBCE8A42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCBDFC3-13C3-45D3-80C9-E533082FAF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "B213D7CC-AD3D-4241-AF59-5B4CFC9BA930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "6E88FA32-5EBE-44BA-979B-60FE8340E8C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CE0E6F-A277-48BE-8F1D-BCA48C57666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "96FDDD94-40C9-47F0-9D43-0C0267F439C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "4E77BE16-C28C-43C2-B2CC-5AC4F33F7E13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "DF3BBE82-E29A-4FD6-A897-1D80DE6ACA4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "0322D5E9-FE05-49EF-A210-A276D69B9F16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*", + "matchCriteriaId": "F188F2EB-60D2-47BB-8FA8-2F832289345E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1DE401-4E0B-4F72-B59D-1A600624D43E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D59B7F84-4C39-46E1-932C-EE52F22F4C6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A0F9C0-4591-4981-863E-1704FC4A0919" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "AEF56328-A74E-432E-A790-E16C941CA3A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5F91421B-F04E-4CA7-8EE3-2F06AC6303C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "C8B6E5BE-2D8B-4BAF-88BE-772F5905875E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFB827C-E7A9-410F-AE0D-5E31C6B29EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "180C12CE-E9EC-4E86-A18A-E57803232193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "8007004F-7331-48FF-9821-866560F3580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "61F877F3-C1EB-47D4-BBF2-0D678403A1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", + "matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", + "matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", + "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", + "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", + "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*", + "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", + "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*", + "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "D682D369-AFAA-47D6-B063-95A9FE336FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "21FDD38A-D864-4E73-BEBE-E3545113FA2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "46DC7974-36DA-49AF-BDA3-671EA5F41441" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "249D78EB-A125-4731-A41B-62F8302D7246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "7E599088-5071-469B-980F-4BA3026856C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "21F58CEE-636B-460E-91D1-330965FA7FE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA5302F-0F9E-4E0A-AA59-CB23B9A89F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "F943E4AE-F0EE-4643-B34D-44896C8CBF6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "4E6ED45F-4479-445D-8970-F90413C51B7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "8922A697-63B0-480E-B91F-4C16E2F325B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "6B1EB55A-4D3A-42ED-9EA0-DF31DE62086C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "36979139-66D2-40DD-A865-547BA9D49786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "815E129B-EB7C-4E67-A50A-38CA19B697AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7E5969-E55B-4EBF-ADDE-8A969174E03D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "3376544F-A13B-4800-952D-08A2F429E9A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "79DA9DD7-A350-4A62-B19A-6AF90CF798F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "7113699B-762C-48BD-AD99-19D1A25995E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "1E178E6C-D717-48B1-B79A-4E071BDFE6AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF7DF14-DD6F-4D24-8F12-AAB145FBDB41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "499C6196-2D34-4312-9C3E-B1A6E8D21112" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "9279A96A-43B2-4FD4-97F0-DA331EACF918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "3479B06E-1B67-4399-BA3A-E02331E21BE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "7855CC38-5E3E-486D-9322-7BF0DC1FF623" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "496E2D60-AEEF-4D34-ABE4-9A9B101643D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "A740BDE4-B65E-4F6F-BAB7-BBA64567EC79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F391FDE-A48C-4F59-BC6F-7880B234E3A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "E10916E9-6105-46F9-993D-F09C223003B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2E9E28-64F4-469C-8F01-FC2290B57106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "AB84CE04-F2D0-4A37-B2BA-25126D1824D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "63ACFACC-23B7-4EAC-BDC0-E3C403642D88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "0F3A95D5-157D-4335-87B4-8DA080A496FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "8D54B325-22D5-4F21-BE28-BE28F6135FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "0444FAA1-6613-45DF-93E2-B19DF8FE157C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "0BAA5367-F81E-425A-A93C-B9220D1BB37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1ED4F8-3B6C-452D-A3D0-D2F1A24AF994" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*", + "matchCriteriaId": "FAF32BC7-57DF-4BF0-BF97-69E97CC048CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "B3836108-E847-4BB6-BFFE-7C81E9D94A10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "D38466E0-40AC-45C6-9C14-1BE309B079CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "D962FBA3-CE59-401B-9451-45001775BA66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", + "matchCriteriaId": "C13F2837-174B-4437-BF3F-CB6BFBF8F64D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "237D305E-016D-4E84-827C-44D04E3E0999" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "E993A32E-D2AF-4519-B4C9-7F576649D20F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "7260A66D-D477-440E-9A87-C05F9BD9E67C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "31059ED1-4D82-43D7-8EF7-042125289CF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "3B813F19-1B37-48F4-99EC-05E0CAA861FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "4220D3B1-BD05-4169-91BA-B1AA45084C46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "84BAF351-4C7F-44F8-812E-9C402CBBB5FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "0595F3D8-8D99-4C82-9EC1-1187C52A6740" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "662ACAD0-7E80-4CB5-8409-03E72A3C59D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "A43EE852-5F22-4387-8332-A12FF3306210" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "4151B2B1-B17F-4F1D-A211-34C7DB84E442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "37B550C9-B2E4-44EE-8E0B-54D150C69A0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "BEBBA614-74E7-43C7-8D33-ADF4BD79D477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "A7A852A3-7CAC-4D35-A583-556D17A0F7E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF5D54D-4403-4C5E-AA65-9FD8661E283B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "02866AED-A1B4-4D89-A11F-27089EF935BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D4408CD8-DC1D-4102-924B-E9E28FC5CECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "C2A39749-3A95-41B6-850B-4D388E6242B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "67B663F9-DBF4-4EEE-836D-C83BF99A682A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "55E780F3-D378-4201-AC69-79C356EE9CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "28FE5158-FA37-476B-8289-11733BB9AFF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "24AE7F08-FB39-4E35-81AD-0186F2A539D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", + "matchCriteriaId": "447FAF3B-8E93-4A2C-A8B1-1A2F7D958754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "08E2628F-456D-4471-A914-D92157725CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "CCA37E61-7EA5-45F3-87F6-432B591A79BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "4AE143DA-B2AA-47C3-BA8D-F0C02AFF36BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1F539B-8422-43AD-8BFB-E57622035B9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "87A96A92-02E7-440C-9E46-0FBE8CE75E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "03F1AEF3-08BD-4CC0-A36A-D26D550853E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD9FF45-C8C2-42E2-B329-48C037A10521" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "36CBB93A-A8C8-477E-B530-B0058C3D15B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "0D029D52-65E5-4129-AB47-E873F53799CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "727E596A-295D-4D70-810A-436FC6A4415D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "368210A0-CC15-4FB9-8334-4ED475523C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*", + "matchCriteriaId": "1C258F34-C557-4586-A8D0-590EC37E252E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*", + "matchCriteriaId": "AD456B15-1AFC-470A-9750-E6D152869FB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*", + "matchCriteriaId": "3B940A51-E9B1-430B-A732-F1B65F54CD2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy12:*:*:*:*:*:*:*", + "matchCriteriaId": "A93140A3-E0C8-4817-802A-27CBFCD40A65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "6994F100-864F-4512-9141-F7D1050F9DD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "FC0CC364-FF3A-4FB3-8004-6628400BC7DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "AF08E7CE-DE01-43B2-A9F0-1CE657E79260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "BC500D08-0DE1-4AA8-AE97-0CF17A706430" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F5D3761-16C8-413A-89AD-C076B9B92FF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "F690BEC9-FAE9-4C02-9993-34BF14FA99EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "716EC9AA-0569-4FA7-A244-1A14FA15C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "39166A66-859D-43A7-9947-3F3C32FBFAAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "F421AC3C-B0BC-4177-ACDB-87792C1636EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "09CD336D-1110-4B0C-B8D4-7C96293CBADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "FFD51F00-C219-439F-918E-9AF20A6E053A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "57BCB671-7ED0-43D5-894F-8B3DBF44E68E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "D4802BC7-F326-4F6E-9C74-04032FF35FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "DEDE3BCF-B518-47B0-BD3B-0B75515771E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "B1B0621A-D7A2-415B-91ED-674F2FB4227B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "CB52603C-CED4-4330-BB53-DDDFEA83882A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "42C9B84C-F9DC-4F9E-82F2-04004D539C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE884ADE-FD51-4F10-89A8-D871E7407C83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "AC22B2CD-5154-4055-A6A7-4C31B84B032B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*", + "matchCriteriaId": "10082A46-7AD3-4533-9A15-267953D9E642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*", + "matchCriteriaId": "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADD1575-BB35-40CE-8452-3D34E25995B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "B6B02867-F082-4A57-9E2E-12B0F4C77526" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*", + "matchCriteriaId": "E8389200-0585-456E-8D0B-D725266ADBBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", + "matchCriteriaId": "C84498B4-7002-44D1-B2B7-B43F3081D258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "0F61B07A-7933-476F-951A-AD0019D2443D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "41939712-5075-4924-ABF2-467430B37197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "945363EE-FE7A-44ED-A4A0-942A1F9B2702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", + "matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "B843CEE5-4D53-414D-95C7-4BA515818E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "72480900-6E08-425F-965D-143B348E374A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBA0926-E790-4B1C-A549-5B7D2F040E5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", + "matchCriteriaId": "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", + "matchCriteriaId": "4E903D9F-530D-4597-ABA9-4C1CFB79814B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", + "matchCriteriaId": "5060BAEA-DF8F-4B85-84F5-1410FD45C733" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*", + "matchCriteriaId": "CB56857D-029C-4DA8-B439-F1B89EA32074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F91AC2D-86F7-4618-A31B-DE081D4C21BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*", + "matchCriteriaId": "D25B94F9-F10F-47CE-8340-CE56E7ED31E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C32C536-640C-468D-872F-442697DB9EE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*", + "matchCriteriaId": "38DE4F33-A677-4848-BB33-10C4A4655735" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*", + "matchCriteriaId": "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*", + "matchCriteriaId": "0894FC09-880C-44D5-B67D-81C92D96D790" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp10:*:*:*:*:*:*:*", + "matchCriteriaId": "81713C7A-EADE-4722-B61C-3BA1671748B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", + "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*", + "matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*", + "matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*", + "matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*", + "matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*", + "matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "7561E37E-E7B9-419F-949F-B8EF52DF00DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "4FAF397C-C67F-488A-8346-CF37F9B7305C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*", + "matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "730D29C4-2BC5-478C-AAFD-E8CF598A5CFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B1CCCEF9-1956-41BA-8E82-925BA98A4874" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5D0F9F49-F517-4646-B94B-A0BF4F9D6315" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6b:*:*:*:*:*:*:*", + "matchCriteriaId": "C1A31DB6-3A66-408C-8E36-2E4EE7C62E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "68A9E030-2999-4881-8EDE-4F6DED01DD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7a:*:*:*:*:*:*:*", + "matchCriteriaId": "98368F1D-5B9E-4A8A-B210-227FA95A555A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "CC217770-5C14-4492-A41A-B46350A529F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8b:*:*:*:*:*:*:*", + "matchCriteriaId": "0D399E4E-3C90-4E74-8921-BB19FB5B64F3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*", + "matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*", + "matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*", + "matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*", + "matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*", + "matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*", + "matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*", + "matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*", + "matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*", + "matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*", + "matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*", + "matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*", + "matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*", + "matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*", + "matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*", + "matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*", + "matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10ee:*:*:*:*:*:*:*", + "matchCriteriaId": "9D497018-2ED5-4A0C-9E1E-1441C7F596D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", + "matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D9F45C-E71F-4425-A0C7-DFFEEC93C152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*", + "matchCriteriaId": "48B351B3-3A18-4068-A95D-68942955070E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "2A005E0C-A744-4AFA-A1D1-2E3228E093FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", + "matchCriteriaId": "DED25B1B-C47A-45E9-8235-081550FB0AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "86B7EC67-B431-4284-8781-9090D134B781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "3598539F-0EEB-45D6-8BA5-A2A3F69D556C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "4CF349D4-BF1C-4127-B6FA-7AD379F62A3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "B6ABE123-BBA5-46CD-8578-4A1F3CB8BA08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "CD674BF9-16F6-4817-9ADE-564A402A5F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", + "matchCriteriaId": "8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DA3731-E719-4DB7-9783-1C00481141EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "483A3F03-F5CC-45BD-AEB7-83E23601BB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "1692889D-BD16-41C6-A226-A9BAF6F64603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*", + "matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*", + "matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "FFBA92E2-5219-40B7-8D80-0B4C796DCDF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", + "matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", + "matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", + "matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", + "matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", + "matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", + "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", + "matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", + "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", + "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", + "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", + "matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", + "matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*", + "matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", + "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", + "matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", + "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", + "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", + "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", + "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", + "matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", + "matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", + "matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", + "matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", + "matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*", + "matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*", + "matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*", + "matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*", + "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", + "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*", + "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", + "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", + "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*", + "matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*", + "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*", + "matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", + "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", + "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*", + "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*", + "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*", + "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*", + "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*", + "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev1-NO2ccFWz", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json index 80531733040..2617287c6f9 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20312", "sourceIdentifier": "psirt@cisco.com", "published": "2024-03-27T17:15:52.690", - "lastModified": "2024-11-21T08:52:20.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:21:14.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,14 +81,4097 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*", + "matchCriteriaId": "189B0C7C-D794-43EB-A6C6-F29C4B9623A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "5AD483E0-66F9-4DD1-85FA-C125C9617E10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "35C1075B-11F3-453C-957D-834C5D6D8CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "115E901C-94B4-4EC7-AA85-03A20CFA90DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "C97051EE-8C42-4546-8EDC-FAD60B3EE1EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "FB435D9A-FA6C-4CBD-8647-3A61B3DAB338" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "14181F4B-9A5C-40B4-BD15-FED694E9AE8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "B62E402E-5D8B-4261-906C-C5668B4A12BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*", + "matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*", + "matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*", + "matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*", + "matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*", + "matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*", + "matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*", + "matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*", + "matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "07DCF559-9324-4CE1-A986-EF4A174DCEFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "38CC9728-4E4A-4536-BC81-031AFE1A74E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "F9DECC49-1DF8-4925-9232-04DA748428B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "B736A1E0-89F4-418C-BC12-7E6A7AC7891F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "2BDC0B5A-E59C-454E-AA0E-6EB9C8888480" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2363876E-0E3B-44BA-8157-FA96554302B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D3131A-74F7-4465-826E-5F6C90240C4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0D1E17-9A5C-4B74-B780-F31364FD9F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "F70ADF53-D937-4CB1-8D17-8B4DB9A5458C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0F30A4-C088-4ECC-ABE0-33D4A7BC8D1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy9:*:*:*:*:*:*:*", + "matchCriteriaId": "73B11B78-1936-42CA-919E-BCD1E0C2A397" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*", + "matchCriteriaId": "A807560F-7111-40AB-BCC8-F3D7A2F92D2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy11:*:*:*:*:*:*:*", + "matchCriteriaId": "AEE56D89-5894-49E9-BDCF-E23AE4159989" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy12:*:*:*:*:*:*:*", + "matchCriteriaId": "EC9347AF-7729-44BD-8E33-610D573C560F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy13:*:*:*:*:*:*:*", + "matchCriteriaId": "14DC014A-2CDD-4294-8AEB-9C0B437C1633" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy14:*:*:*:*:*:*:*", + "matchCriteriaId": "B9AB472D-2158-44DC-A627-8C4D52F476A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*", + "matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy16:*:*:*:*:*:*:*", + "matchCriteriaId": "AC27EED6-7F43-422F-8E61-CDD4E9EDC719" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", + "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF56A5C-3370-4F64-9F2D-F003B8536CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "78159F0B-2553-41F7-9ABA-38065EB5B23E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "46DC8876-9FC4-451A-996F-71F2B1C35781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "1AE57C85-794E-405B-841F-A806D32C08EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*", + "matchCriteriaId": "7B91687C-A8F8-45FB-BF03-8534E9230AB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "E082DB05-253F-4C6F-BD0A-524699309D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B43D4858-AE1C-4372-97F9-5983EEE6ED4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "9678A6F2-0624-4A8A-9991-9DADCDDB2687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC0B809-72AD-413F-BE84-73FE2DB33950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "5F2834B6-AA9D-4FDC-A228-CED66C799849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "B3426024-7199-4B7B-90CB-CE83FD2E0878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "BF163F6F-1A6D-4AA9-AAC2-52249BB28421" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "CD250CC8-B26A-424E-A737-97F2A7E7C4CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", + "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", + "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", + "matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*", + "matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*", + "matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*", + "matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", + "matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", + "matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", + "matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "DC422D76-8337-41F0-98AE-E5D85DF4D0DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB76F47-8723-4888-8613-AC3273BAB758" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0c:*:*:*:*:*:*:*", + "matchCriteriaId": "13CC5862-F8D0-4184-A29B-AE627680D0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CCA5C4-3683-46C9-801B-683E194DDA8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "27D4C7E2-F1F1-43BF-A53E-2A8FF408F4A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "B05373F4-E820-4D22-A86A-904854F04C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "4C38969D-65EB-4C80-BB2A-A1245C4E718B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "A429CFF2-A288-4CD5-9C06-8D18647C67E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "AB3A9655-9E22-4AEA-BBCF-6C0749D0289E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "D80852CE-8D91-4E85-A97F-C7A9AF5278CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "AF777880-43BF-4D4A-9BA1-B2E925B5DE11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*", + "matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", + "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*", + "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*", + "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10e:*:*:*:*:*:*:*", + "matchCriteriaId": "CD7EF09E-2D74-4B05-B36E-263E35448FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", + "matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*", + "matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", + "matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", + "matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", + "matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", + "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", + "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", + "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*", + "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", + "matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", + "matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*", + "matchCriteriaId": "E3714E18-9A21-4D04-BB5E-0299AF443E2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*", + "matchCriteriaId": "F6FE61C7-3B61-4085-AD91-137459DA29D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*", + "matchCriteriaId": "71080D8B-BC81-4CDF-8626-D0F35DA40AEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*", + "matchCriteriaId": "CF10596D-457A-4DA8-8037-5E92E1D39232" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "A37D2CBE-2B93-45CB-AB59-AFDF14277E4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "E2911989-D074-42DF-AB58-6849B3E0B72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "34299D29-96EC-4AAA-8137-49B292FC2D67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "5092DFCF-FEE9-4BE3-9116-01F3CBCE8A42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCBDFC3-13C3-45D3-80C9-E533082FAF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "B213D7CC-AD3D-4241-AF59-5B4CFC9BA930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "6E88FA32-5EBE-44BA-979B-60FE8340E8C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CE0E6F-A277-48BE-8F1D-BCA48C57666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "96FDDD94-40C9-47F0-9D43-0C0267F439C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "4E77BE16-C28C-43C2-B2CC-5AC4F33F7E13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "DF3BBE82-E29A-4FD6-A897-1D80DE6ACA4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "0322D5E9-FE05-49EF-A210-A276D69B9F16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*", + "matchCriteriaId": "F188F2EB-60D2-47BB-8FA8-2F832289345E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1DE401-4E0B-4F72-B59D-1A600624D43E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D59B7F84-4C39-46E1-932C-EE52F22F4C6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A0F9C0-4591-4981-863E-1704FC4A0919" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "AEF56328-A74E-432E-A790-E16C941CA3A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5F91421B-F04E-4CA7-8EE3-2F06AC6303C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "C8B6E5BE-2D8B-4BAF-88BE-772F5905875E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*", + "matchCriteriaId": "9CFB827C-E7A9-410F-AE0D-5E31C6B29EE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "180C12CE-E9EC-4E86-A18A-E57803232193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "8007004F-7331-48FF-9821-866560F3580A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "61F877F3-C1EB-47D4-BBF2-0D678403A1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", + "matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", + "matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", + "matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", + "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", + "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", + "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", + "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*", + "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*", + "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*", + "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*", + "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*", + "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*", + "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*", + "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*", + "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*", + "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "D682D369-AFAA-47D6-B063-95A9FE336FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "21FDD38A-D864-4E73-BEBE-E3545113FA2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "46DC7974-36DA-49AF-BDA3-671EA5F41441" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "249D78EB-A125-4731-A41B-62F8302D7246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "7E599088-5071-469B-980F-4BA3026856C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "21F58CEE-636B-460E-91D1-330965FA7FE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "FCA5302F-0F9E-4E0A-AA59-CB23B9A89F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "F943E4AE-F0EE-4643-B34D-44896C8CBF6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "4E6ED45F-4479-445D-8970-F90413C51B7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "8922A697-63B0-480E-B91F-4C16E2F325B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "6B1EB55A-4D3A-42ED-9EA0-DF31DE62086C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "36979139-66D2-40DD-A865-547BA9D49786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "815E129B-EB7C-4E67-A50A-38CA19B697AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7E5969-E55B-4EBF-ADDE-8A969174E03D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "3376544F-A13B-4800-952D-08A2F429E9A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "79DA9DD7-A350-4A62-B19A-6AF90CF798F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "7113699B-762C-48BD-AD99-19D1A25995E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "1E178E6C-D717-48B1-B79A-4E071BDFE6AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF7DF14-DD6F-4D24-8F12-AAB145FBDB41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "499C6196-2D34-4312-9C3E-B1A6E8D21112" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "9279A96A-43B2-4FD4-97F0-DA331EACF918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "3479B06E-1B67-4399-BA3A-E02331E21BE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "7855CC38-5E3E-486D-9322-7BF0DC1FF623" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "496E2D60-AEEF-4D34-ABE4-9A9B101643D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "A740BDE4-B65E-4F6F-BAB7-BBA64567EC79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F391FDE-A48C-4F59-BC6F-7880B234E3A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "E10916E9-6105-46F9-993D-F09C223003B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D2E9E28-64F4-469C-8F01-FC2290B57106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "AB84CE04-F2D0-4A37-B2BA-25126D1824D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1a:*:*:*:*:*:*:*", + "matchCriteriaId": "8957EB38-37CF-47FA-853D-7A1AA6079874" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "63ACFACC-23B7-4EAC-BDC0-E3C403642D88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "0F3A95D5-157D-4335-87B4-8DA080A496FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "8D54B325-22D5-4F21-BE28-BE28F6135FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "0444FAA1-6613-45DF-93E2-B19DF8FE157C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "0BAA5367-F81E-425A-A93C-B9220D1BB37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1ED4F8-3B6C-452D-A3D0-D2F1A24AF994" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*", + "matchCriteriaId": "FAF32BC7-57DF-4BF0-BF97-69E97CC048CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "B3836108-E847-4BB6-BFFE-7C81E9D94A10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "D38466E0-40AC-45C6-9C14-1BE309B079CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "D962FBA3-CE59-401B-9451-45001775BA66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", + "matchCriteriaId": "C13F2837-174B-4437-BF3F-CB6BFBF8F64D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "237D305E-016D-4E84-827C-44D04E3E0999" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "E993A32E-D2AF-4519-B4C9-7F576649D20F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "7260A66D-D477-440E-9A87-C05F9BD9E67C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "31059ED1-4D82-43D7-8EF7-042125289CF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "3B813F19-1B37-48F4-99EC-05E0CAA861FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "4220D3B1-BD05-4169-91BA-B1AA45084C46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "84BAF351-4C7F-44F8-812E-9C402CBBB5FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "0595F3D8-8D99-4C82-9EC1-1187C52A6740" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "662ACAD0-7E80-4CB5-8409-03E72A3C59D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "A43EE852-5F22-4387-8332-A12FF3306210" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", + "matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "4151B2B1-B17F-4F1D-A211-34C7DB84E442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "37B550C9-B2E4-44EE-8E0B-54D150C69A0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "BEBBA614-74E7-43C7-8D33-ADF4BD79D477" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "A7A852A3-7CAC-4D35-A583-556D17A0F7E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "DBF5D54D-4403-4C5E-AA65-9FD8661E283B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "02866AED-A1B4-4D89-A11F-27089EF935BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "D4408CD8-DC1D-4102-924B-E9E28FC5CECF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "C2A39749-3A95-41B6-850B-4D388E6242B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "67B663F9-DBF4-4EEE-836D-C83BF99A682A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "55E780F3-D378-4201-AC69-79C356EE9CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "28FE5158-FA37-476B-8289-11733BB9AFF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "24AE7F08-FB39-4E35-81AD-0186F2A539D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", + "matchCriteriaId": "447FAF3B-8E93-4A2C-A8B1-1A2F7D958754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "08E2628F-456D-4471-A914-D92157725CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "CCA37E61-7EA5-45F3-87F6-432B591A79BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "4AE143DA-B2AA-47C3-BA8D-F0C02AFF36BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "4C1F539B-8422-43AD-8BFB-E57622035B9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "87A96A92-02E7-440C-9E46-0FBE8CE75E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "03F1AEF3-08BD-4CC0-A36A-D26D550853E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD9FF45-C8C2-42E2-B329-48C037A10521" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "36CBB93A-A8C8-477E-B530-B0058C3D15B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", + "matchCriteriaId": "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*", + "matchCriteriaId": "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*", + "matchCriteriaId": "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*", + "matchCriteriaId": "0D029D52-65E5-4129-AB47-E873F53799CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*", + "matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*", + "matchCriteriaId": "727E596A-295D-4D70-810A-436FC6A4415D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*", + "matchCriteriaId": "368210A0-CC15-4FB9-8334-4ED475523C2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*", + "matchCriteriaId": "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*", + "matchCriteriaId": "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy9:*:*:*:*:*:*:*", + "matchCriteriaId": "1C258F34-C557-4586-A8D0-590EC37E252E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy10:*:*:*:*:*:*:*", + "matchCriteriaId": "AD456B15-1AFC-470A-9750-E6D152869FB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy11:*:*:*:*:*:*:*", + "matchCriteriaId": "3B940A51-E9B1-430B-A732-F1B65F54CD2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy12:*:*:*:*:*:*:*", + "matchCriteriaId": "A93140A3-E0C8-4817-802A-27CBFCD40A65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "6994F100-864F-4512-9141-F7D1050F9DD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "FC0CC364-FF3A-4FB3-8004-6628400BC7DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "AF08E7CE-DE01-43B2-A9F0-1CE657E79260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "BC500D08-0DE1-4AA8-AE97-0CF17A706430" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "0F5D3761-16C8-413A-89AD-C076B9B92FF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "F690BEC9-FAE9-4C02-9993-34BF14FA99EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", + "matchCriteriaId": "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "716EC9AA-0569-4FA7-A244-1A14FA15C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "39166A66-859D-43A7-9947-3F3C32FBFAAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "F421AC3C-B0BC-4177-ACDB-87792C1636EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "09CD336D-1110-4B0C-B8D4-7C96293CBADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "FFD51F00-C219-439F-918E-9AF20A6E053A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "57BCB671-7ED0-43D5-894F-8B3DBF44E68E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "D4802BC7-F326-4F6E-9C74-04032FF35FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "DEDE3BCF-B518-47B0-BD3B-0B75515771E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*", + "matchCriteriaId": "B1B0621A-D7A2-415B-91ED-674F2FB4227B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", + "matchCriteriaId": "CB52603C-CED4-4330-BB53-DDDFEA83882A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "42C9B84C-F9DC-4F9E-82F2-04004D539C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE884ADE-FD51-4F10-89A8-D871E7407C83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", + "matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*", + "matchCriteriaId": "AC22B2CD-5154-4055-A6A7-4C31B84B032B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*", + "matchCriteriaId": "10082A46-7AD3-4533-9A15-267953D9E642" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*", + "matchCriteriaId": "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*", + "matchCriteriaId": "6ADD1575-BB35-40CE-8452-3D34E25995B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*", + "matchCriteriaId": "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*", + "matchCriteriaId": "B6B02867-F082-4A57-9E2E-12B0F4C77526" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*", + "matchCriteriaId": "E8389200-0585-456E-8D0B-D725266ADBBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*", + "matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", + "matchCriteriaId": "C84498B4-7002-44D1-B2B7-B43F3081D258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "0F61B07A-7933-476F-951A-AD0019D2443D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "41939712-5075-4924-ABF2-467430B37197" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "945363EE-FE7A-44ED-A4A0-942A1F9B2702" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", + "matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "204B0A52-F6AB-406B-B46D-E92F2D7D87F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", + "matchCriteriaId": "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", + "matchCriteriaId": "B843CEE5-4D53-414D-95C7-4BA515818E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", + "matchCriteriaId": "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", + "matchCriteriaId": "72480900-6E08-425F-965D-143B348E374A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBA0926-E790-4B1C-A549-5B7D2F040E5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", + "matchCriteriaId": "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", + "matchCriteriaId": "4E903D9F-530D-4597-ABA9-4C1CFB79814B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", + "matchCriteriaId": "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", + "matchCriteriaId": "5060BAEA-DF8F-4B85-84F5-1410FD45C733" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*", + "matchCriteriaId": "CB56857D-029C-4DA8-B439-F1B89EA32074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F91AC2D-86F7-4618-A31B-DE081D4C21BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*", + "matchCriteriaId": "D25B94F9-F10F-47CE-8340-CE56E7ED31E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C32C536-640C-468D-872F-442697DB9EE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*", + "matchCriteriaId": "38DE4F33-A677-4848-BB33-10C4A4655735" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*", + "matchCriteriaId": "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*", + "matchCriteriaId": "0894FC09-880C-44D5-B67D-81C92D96D790" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp10:*:*:*:*:*:*:*", + "matchCriteriaId": "81713C7A-EADE-4722-B61C-3BA1671748B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", + "matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", + "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", + "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", + "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", + "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "686FD45C-7722-4D98-A6D7-C36CAC56A4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "871E33AC-B469-47BA-9317-DC9E3E9BF5C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "C4091CAC-BFAA-404C-A827-4DA9EADDF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*", + "matchCriteriaId": "369A99E0-3451-41D1-8C56-5352EA689950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "33D4A7FA-E4E0-49C2-97FD-A547A1612F75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "DA0B918F-A28C-4B5A-A566-6E588B4F6696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "436114F2-D906-4469-99C4-10B75253B3D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2A434E7-B27C-4663-BE83-39A650D22D26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "47C106CF-CBD3-4630-8E77-EDB1643F97E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "A1DB7943-5CE1-44F6-B093-5EA65BF71A59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "64404B00-4956-47B8-ACDB-88E365E97212" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE6A696-5CBC-4552-A54E-55C21BC74D7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "41237041-1D82-4C6C-BF48-ECEDF9DB08C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*", + "matchCriteriaId": "CAB72CA3-088E-4EFE-BE1C-190C64101851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "FA584AC4-96AB-4026-84DF-F44F3B97F7E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "22EB41FD-4DE2-4753-A18C-C877B81B51D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "158EDE62-04C9-471B-B243-309D49583E67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "D8609F10-2B43-4BDC-AAF1-80D589910EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "270A1FF4-8541-4026-AE2D-7D500DC401E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "5A58C01B-459E-432F-A49F-68EC45EE6E14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*", + "matchCriteriaId": "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*", + "matchCriteriaId": "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "198FF520-7631-49D9-B8A8-2E64F6237CC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "94E067E8-552B-4691-9F6A-C5E8766287BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "405CC56E-574F-4983-B492-C8811FAF06E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*", + "matchCriteriaId": "B1829074-66F9-4B3B-A084-B88D838CFC44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "6715A135-61A7-4E56-948D-8A8D5F7C98C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B2CC4602-D1F5-4843-991A-2903C8336251" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "7BCCD64D-D73C-45FE-B49C-F79E23431B37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "7561E37E-E7B9-419F-949F-B8EF52DF00DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.8\\(3\\)m9:*:*:*:*:*:*:*", + "matchCriteriaId": "4FAF397C-C67F-488A-8346-CF37F9B7305C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*", + "matchCriteriaId": "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*", + "matchCriteriaId": "0807458A-2453-4575-AE19-0DE15E04B88C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*", + "matchCriteriaId": "B8313597-49A9-4918-B8D5-8E53C5C9AFAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*", + "matchCriteriaId": "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*", + "matchCriteriaId": "13C6DA27-2445-4850-B0EF-82EE8C01C0B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4:*:*:*:*:*:*:*", + "matchCriteriaId": "63BEFCC8-CC04-4C41-B31A-BF01E40FA1AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m4a:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E473CF-FE4B-4DBE-9EBE-337AE415FA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m5:*:*:*:*:*:*:*", + "matchCriteriaId": "730D29C4-2BC5-478C-AAFD-E8CF598A5CFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6:*:*:*:*:*:*:*", + "matchCriteriaId": "B1CCCEF9-1956-41BA-8E82-925BA98A4874" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5D0F9F49-F517-4646-B94B-A0BF4F9D6315" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m6b:*:*:*:*:*:*:*", + "matchCriteriaId": "C1A31DB6-3A66-408C-8E36-2E4EE7C62E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7:*:*:*:*:*:*:*", + "matchCriteriaId": "68A9E030-2999-4881-8EDE-4F6DED01DD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m7a:*:*:*:*:*:*:*", + "matchCriteriaId": "98368F1D-5B9E-4A8A-B210-227FA95A555A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8:*:*:*:*:*:*:*", + "matchCriteriaId": "CC217770-5C14-4492-A41A-B46350A529F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios:15.9\\(3\\)m8b:*:*:*:*:*:*:*", + "matchCriteriaId": "0D399E4E-3C90-4E74-8921-BB19FB5B64F3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0se:*:*:*:*:*:*:*", + "matchCriteriaId": "8DFD3A39-9E02-409C-9F9C-9C90D58D3A3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1se:*:*:*:*:*:*:*", + "matchCriteriaId": "D5A0FE9F-FFEC-400B-8CDF-2888FDCD01A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2se:*:*:*:*:*:*:*", + "matchCriteriaId": "EFD751BA-0987-48BB-89C0-A82F78816423" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3se:*:*:*:*:*:*:*", + "matchCriteriaId": "CDF46126-B8C2-4C03-BF28-F36BB54A6F01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0se:*:*:*:*:*:*:*", + "matchCriteriaId": "AEC52EC4-6658-40AB-A357-F9B538F21ED2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*", + "matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1se:*:*:*:*:*:*:*", + "matchCriteriaId": "63B34E77-D0BD-4501-A125-CDBE9A47031F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*", + "matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2se:*:*:*:*:*:*:*", + "matchCriteriaId": "9029376B-E263-4B30-8B97-7101CFF7D39D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*", + "matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3se:*:*:*:*:*:*:*", + "matchCriteriaId": "BD337928-C7D9-4CBC-8785-5C49FCA5B90F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.4se:*:*:*:*:*:*:*", + "matchCriteriaId": "10E83B0A-33F1-4154-969E-E66E800890DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.5se:*:*:*:*:*:*:*", + "matchCriteriaId": "287E952E-588D-4825-9EB3-03CE16F96E28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*", + "matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*", + "matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*", + "matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*", + "matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*", + "matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*", + "matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*", + "matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*", + "matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*", + "matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", + "matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*", + "matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*", + "matchCriteriaId": "87687169-312C-41E6-9557-B2536A4CCA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "312FDFDD-7612-4E79-A12E-7B1540324696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "5420E152-A00C-406C-8E27-6B7ADE4ABF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*", + "matchCriteriaId": "D8A56292-386C-4FC8-BC54-EF9E465F891B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "036DAA45-B363-47BB-ADBA-992F381572EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*:*:*:*:*:*", + "matchCriteriaId": "86176257-7075-476E-BE09-B0E469392BD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "CCB1EA1E-D995-4732-9685-75AC9042D484" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "5EA68978-C42E-4A5E-A0D6-7887FA0318B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF06D7B-A239-4046-A704-01C54D534F35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "4622910B-5459-4FA4-A8D0-239AF2EFFE06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "2835C64E-808F-4A6C-B245-7A9996FAFE3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "8E1040AF-A087-4791-BFC3-36CA3F3208E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "7F95B900-12A3-4488-BB50-20C972BEE169" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*", + "matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", + "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10ee:*:*:*:*:*:*:*", + "matchCriteriaId": "9D497018-2ED5-4A0C-9E1E-1441C7F596D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "BC3B6D68-DA31-45EB-ACFD-AE703B2FA2D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "6352A220-8F3E-4E08-8DD3-50E366434333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "10F278DC-5102-4A18-9C72-E8FEEDCC5729" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "513675B5-D62C-442D-8754-DC4F221942B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", + "matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D9F45C-E71F-4425-A0C7-DFFEEC93C152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "26FB3B1A-FB8C-4371-A6D2-AB83ECF17F96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1xbs:*:*:*:*:*:*:*", + "matchCriteriaId": "48B351B3-3A18-4068-A95D-68942955070E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "2A005E0C-A744-4AFA-A1D1-2E3228E093FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2ts:*:*:*:*:*:*:*", + "matchCriteriaId": "DED25B1B-C47A-45E9-8235-081550FB0AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "86B7EC67-B431-4284-8781-9090D134B781" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "3598539F-0EEB-45D6-8BA5-A2A3F69D556C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "4CF349D4-BF1C-4127-B6FA-7AD379F62A3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "B6ABE123-BBA5-46CD-8578-4A1F3CB8BA08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "CD674BF9-16F6-4817-9ADE-564A402A5F06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*", + "matchCriteriaId": "8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DA3731-E719-4DB7-9783-1C00481141EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "483A3F03-F5CC-45BD-AEB7-83E23601BB22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "1692889D-BD16-41C6-A226-A9BAF6F64603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*", + "matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "6DAC081C-9A22-4CBC-A9D0-DD9995801791" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*", + "matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "F43F819E-3072-430F-8C52-B43FF28D4687" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*", + "matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*", + "matchCriteriaId": "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*", + "matchCriteriaId": "5F79BC92-0869-447C-AF34-3FBF42375D1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*", + "matchCriteriaId": "4615A652-96A3-4809-94C0-7B7BF607B519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*", + "matchCriteriaId": "4A31B2A2-E88A-49AA-B187-3EA91CB8842A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.6e:*:*:*:*:*:*:*", + "matchCriteriaId": "1B26F38B-B72E-4BB7-B9FB-18C8AF92E05A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.7e:*:*:*:*:*:*:*", + "matchCriteriaId": "1D58A513-5A75-48C1-9B9E-FAD0C30AC5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.8e:*:*:*:*:*:*:*", + "matchCriteriaId": "BD133FF7-A5D6-4463-94DC-7A4642610591" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.9e:*:*:*:*:*:*:*", + "matchCriteriaId": "CC7C7D72-DC07-4FEA-939B-1D1323A3E6FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "246251E8-7D4E-4CD4-8D4F-BF360780FA36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", + "matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "3F6E9386-30B4-4E86-9676-E7E005274048" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", + "matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", + "matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", + "matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "96637FB9-B552-417B-8C7F-4F4524F69690" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", + "matchCriteriaId": "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", + "matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", + "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", + "matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", + "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", + "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", + "matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", + "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", + "matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", + "matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", + "matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", + "matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*", + "matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", + "matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*", + "matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*", + "matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", + "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", + "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", + "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", + "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", + "matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", + "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", + "matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", + "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", + "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", + "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", + "matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", + "matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", + "matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", + "matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", + "matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", + "matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*", + "matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*", + "matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*", + "matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*", + "matchCriteriaId": "CB2D4A7B-E0B7-4D65-B242-75934490D703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", + "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", + "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*", + "matchCriteriaId": "01B53828-C520-4845-9C14-6C7D50EAA3A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*", + "matchCriteriaId": "20F23DB7-6F8E-470A-9B43-0ACEEF331C38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", + "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", + "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", + "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*", + "matchCriteriaId": "79CF8D4E-F82A-469C-A8C2-0C203A800A05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", + "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", + "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", + "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", + "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", + "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", + "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "D18B32E3-6B33-4E3D-879A-82E2F0BFC906" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*", + "matchCriteriaId": "46E37204-FC9A-4397-AFA4-9CAC7A116D55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", + "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", + "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8FCB9440-F470-45D1-AAFA-01FB5D76B600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "3F66ECFE-B631-47AE-995F-024A4E586A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5B736F09-3B51-4B2A-92F6-602847001F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "2F58A94E-B050-4EFA-84BA-43B11BA22E77" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*", + "matchCriteriaId": "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*", + "matchCriteriaId": "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "37D5E77B-687D-4AE7-95B8-0AB56AF5DAD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*", + "matchCriteriaId": "91EF2384-9939-4F86-8A0F-7CB7034980E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E51B09-D66D-4AE8-AF96-AEDE54A7C209" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", + "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", + "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*", + "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*", + "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*", + "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*", + "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*", + "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-isis-sGjyOUHX", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23335.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23335.json index 078e4c8d459..66615183e67 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23335.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23335", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-01T07:15:38.240", - "lastModified": "2024-11-21T08:57:32.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:03:32.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,32 +49,80 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.38", + "matchCriteriaId": "5AA2C895-E246-429E-A8DA-DE9A52BDEEC9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mybb/mybb/commit/450259e501b94c9d483efb167cb2bf875605e111.patch", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mybb/mybb/security/advisories/GHSA-94xr-g4ww-j47r", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://mybb.com/versions/1.8.38", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://github.com/mybb/mybb/commit/450259e501b94c9d483efb167cb2bf875605e111.patch", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mybb/mybb/security/advisories/GHSA-94xr-g4ww-j47r", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://mybb.com/versions/1.8.38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23336.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23336.json index c6dc6f78981..17032ecbf28 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23336.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23336", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-01T07:15:38.660", - "lastModified": "2024-11-21T08:57:32.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:10:32.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,38 +55,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.8.38", + "matchCriteriaId": "5AA2C895-E246-429E-A8DA-DE9A52BDEEC9" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.mybb.com/1.8/administration/configuration-file", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://mybb.com/versions/1.8.38", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://docs.mybb.com/1.8/administration/configuration-file", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://mybb.com/versions/1.8.38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json index 8fd3e0b0024..c5a2d8919b5 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28056", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T18:15:10.723", - "lastModified": "2025-03-20T19:15:28.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:40:14.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,96 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:amplify_cli:*:*:*:*:*:aws:*:*", + "versionEndExcluding": "12.10.1", + "matchCriteriaId": "35AAD281-C3B3-4CC3-8281-BF023B6906D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-003/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/aws-amplify/amplify-cli/blob/8ad57bf99a404f3c92547c8a175458016f682fac/packages/amplify-provider-awscloudformation/resources/update-idp-roles-cfn.json", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/aws-amplify/amplify-cli/commit/73b08dc424db2fb60399c5343c314e02e849d4a1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aws-amplify/amplify-cli/releases/tag/v12.10.1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://aws.amazon.com/security/security-bulletins/AWS-2024-003/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/aws-amplify/amplify-cli/blob/8ad57bf99a404f3c92547c8a175458016f682fac/packages/amplify-provider-awscloudformation/resources/update-idp-roles-cfn.json", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/aws-amplify/amplify-cli/commit/73b08dc424db2fb60399c5343c314e02e849d4a1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/aws-amplify/amplify-cli/releases/tag/v12.10.1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://securitylabs.datadoghq.com/articles/amplified-exposure-how-aws-flaws-made-amplify-iam-roles-vulnerable-to-takeover/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28871.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28871.json index 4dab9af3349..0898fc106e2 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28871.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28871", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-04T15:15:38.647", - "lastModified": "2024-11-21T09:07:05.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:54:40.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,79 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oisf:libhtp:0.5.46:*:*:*:*:*:*:*", + "matchCriteriaId": "23444241-F9FB-411D-965A-76586A07A815" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://redmine.openinfosecfoundation.org/issues/6757", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://redmine.openinfosecfoundation.org/issues/6757", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json index 13fd261b4f4..d00c1246d0f 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29007", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T08:15:06.970", - "lastModified": "2024-11-21T09:07:21.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:05:20.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,58 @@ "value": "CWE-918" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.1.0", + "versionEndExcluding": "4.18.1.1", + "matchCriteriaId": "B2EE4F78-B6F4-43CB-979E-BFFFFA139AD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51E212EC-AC62-4533-B3B2-A660807F0C1F" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29008.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29008.json index 3976ee01af1..e99fbd62ebb 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29008.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29008", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T08:15:07.063", - "lastModified": "2024-11-21T09:07:21.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:00:30.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.0.0", + "versionEndExcluding": "4.18.1.1", + "matchCriteriaId": "9368B571-30EC-4EAF-BC4E-8D8DADC7D851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "51E212EC-AC62-4533-B3B2-A660807F0C1F" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30256.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30256.json index 6db191c4009..abffe80fb05 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30256.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30256.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30256", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-16T15:15:36.487", - "lastModified": "2024-11-21T09:11:33.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:30:00.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openwebui:open_webui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.1.117", + "matchCriteriaId": "93F422C2-AAAB-46C8-8AD5-27DAC5DED36E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-39wr-r5vm-3jxj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2024-033_open-webui", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://github.com/open-webui/open-webui/security/advisories/GHSA-39wr-r5vm-3jxj", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2024-033_open-webui", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json index 378cbf7f886..43179c95483 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33775.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33775", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T13:15:52.130", - "lastModified": "2024-11-21T09:17:28.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:22:14.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +61,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nagios:nagios_xi:2024:r1.0.1:*:*:*:*:*:*", + "matchCriteriaId": "C1FE1A0B-78D1-4626-A4CD-21B843DA596E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Neo-XeD/CVE-2024-33775", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.nagios.com/changelog/#nagios-xi", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/Neo-XeD/CVE-2024-33775", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.nagios.com/changelog/#nagios-xi", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36048.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36048.json index 46aea825e10..b203716dec0 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36048.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36048.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36048", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-18T21:15:47.673", - "lastModified": "2024-11-21T09:21:30.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:21:31.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,135 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.17", + "matchCriteriaId": "06B844AA-8325-4FBB-8B65-56C09DEE08A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.2.13", + "matchCriteriaId": "838DE514-7032-40DC-AF57-1661CB8FAFB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndExcluding": "6.5.6", + "matchCriteriaId": "10881526-5262-4B7D-AB3D-EFF4A458C57B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.0", + "versionEndExcluding": "6.7.1", + "matchCriteriaId": "84302790-D8CB-4737-A582-7FFB743E8DEE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560317", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://codereview.qt-project.org/c/qt/qtnetworkauth/+/560368", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGB6KUPJFQWUBKXVDPJUMAD6KNJJEWPW/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOOZZZSK5PNRHFGQMUGUHVYWLILFJCRS/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPHAI3DKDCIU6XLNS6PV6GFS2PHH3GZM/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json index 4e3d3391c43..3d734a388dd 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36383", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-27T11:15:08.710", - "lastModified": "2024-11-21T09:22:03.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:22:59.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logpoint:saml_authentication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.0.3", + "matchCriteriaId": "0DF7A077-8051-45F1-BC65-AD18F3410B08" + } + ] + } + ] + } + ], "references": [ { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://servicedesk.logpoint.com/hc/en-us/articles/19128172110621-Arbitrary-file-deletion-through-URL-Injection-to-SAML-SSO-URL-Response", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json index ad27de49f6a..4034dd226df 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40750.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40750", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T20:15:12.357", - "lastModified": "2024-11-22T19:15:07.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:15:24.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,90 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:mx6200_firmware:1.0.8.215731:*:*:*:*:*:*:*", + "matchCriteriaId": "98BE0603-7E43-48A9-8838-1884AC4BD6F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:mx6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BC95C8A-2720-467C-A911-1896C625A473" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:mbe7000_firmware:1.0.10.215314:*:*:*:*:*:*:*", + "matchCriteriaId": "1AC4F3D2-AF7F-47A4-B6D9-304B7EA62C44" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:mbe7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56643D1C-DB0B-40A3-9029-E3B95241BB8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://news.ycombinator.com/item?id=40917312", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Press/Media Coverage" + ] }, { "url": "https://news.ycombinator.com/item?id=40917312", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://stackdiary.com/linksys-velop-routers-send-wi-fi-passwords-in-plaintext-to-us-servers/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47226.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47226.json index 758c9571c08..903fd279731 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47226.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47226.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47226", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-22T02:15:02.797", - "lastModified": "2025-02-10T22:15:35.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:50:07.543", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -58,14 +58,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox:netbox:4.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "AB7E720B-AA69-447A-818C-0E499CDE2200" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/tu3n4nh/netbox/issues/1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48286.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48286.json index b00d97bbeff..e7db8b15759 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48286.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48286.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48286", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T18:15:09.710", - "lastModified": "2024-11-21T21:15:22.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:15:59.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linksys:e3000_firmware:1.0.06.002:*:*:*:*:*:*:*", + "matchCriteriaId": "A29A75AC-CD80-4524-BAD4-20006D38BB27" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:linksys:e3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6F8223-1DC8-4465-B2A7-3C43EB5FA4D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/Cisco_Linksys_E3000_rce.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53621.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53621.json new file mode 100644 index 00000000000..6075566625f --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53621.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-53621", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-06-30T15:15:22.727", + "lastModified": "2025-06-30T15:15:22.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow in the formSetCfm() function of Tenda AC1206 1200M 11ac US_AC1206V1.0RTL_V15.03.06.23_multi_TD01 allows attackers to cause a Denial of Service (DoS) via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1b7DlkG7XVmJmCxDrX7u1X7CAk-lOviBX/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/qingwei4/Router-VR/blob/main/CVE-2024-53621/CVE-2024-53621.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json index 2357f1984de..054832a0665 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54772", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:09.117", - "lastModified": "2025-02-24T16:15:12.213", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:48:12.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*", + "versionStartIncluding": "6.43", + "versionEndExcluding": "6.49.18", + "matchCriteriaId": "F618C1B1-340C-4893-A0FF-23B533F787E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:ltr:*:*:*", + "versionStartIncluding": "6.43.13", + "versionEndIncluding": "6.49.13", + "matchCriteriaId": "2DD4F8E4-8A7E-408E-ACF8-C7D003D78027" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*", + "versionStartIncluding": "7.1", + "versionEndExcluding": "7.18", + "matchCriteriaId": "BD087026-C45D-44F3-A305-41A07FDB14EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/deauther890/CVE-2024-54772", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-549xx/CVE-2024-54952.json b/CVE-2024/CVE-2024-549xx/CVE-2024-54952.json index a54c654a418..56a151e2df9 100644 --- a/CVE-2024/CVE-2024-549xx/CVE-2024-54952.json +++ b/CVE-2024/CVE-2024-549xx/CVE-2024-54952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54952", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-29T20:15:26.007", - "lastModified": "2025-05-30T16:31:03.107", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:46:38.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mikrotik:routeros:6.40.5:*:*:*:-:*:*:*", + "matchCriteriaId": "22D51A8C-A3AA-46D3-9191-2C7982039A0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/noobone123/RouterOS-issues/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json index 4415aa87702..0e5285fce11 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56915.json @@ -2,13 +2,17 @@ "id": "CVE-2024-56915", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-26T15:15:22.570", - "lastModified": "2025-06-26T18:57:43.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:44:36.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netbox Community v4.1.7 and fixed in v.4.2.2 is vulnerable to Cross Site Scripting (XSS) via the RSS feed widget." + }, + { + "lang": "es", + "value": "Netbox Community v4.1.7 y corregido en v.4.2.2 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s del widget de fuente RSS." } ], "metrics": { @@ -47,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.7", + "versionEndExcluding": "4.2.2", + "matchCriteriaId": "054538C0-2600-4CED-BA7D-5A16A950D2BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56915", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://youtu.be/n_5w0WVP8zE", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json index bdb53c516f1..d23813ca6bb 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56916.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56916", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T18:15:24.240", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:43:46.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.7", + "versionEndIncluding": "4.2.1", + "matchCriteriaId": "F4F7646D-0677-4FE5-B4B1-3F10F068A625" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56916", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "Exploit" + ] }, { "url": "https://www.youtube.com/watch?v=GC8-PUlu2i8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json index 1c84b9867f0..fcd4389460f 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56917", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T20:15:24.790", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:44:01.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.7", + "versionEndIncluding": "4.2.1", + "matchCriteriaId": "F4F7646D-0677-4FE5-B4B1-3F10F068A625" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56917", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://youtu.be/GC8-PUlu2i8?si=eoScOk8IUJdwPDc_&t=172", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json b/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json index e9f877b82df..fe66b27382b 100644 --- a/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json +++ b/CVE-2024/CVE-2024-569xx/CVE-2024-56918.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56918", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-24T17:15:29.333", - "lastModified": "2025-06-26T18:58:14.280", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T14:42:40.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netbox:netbox:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.7", + "versionEndIncluding": "4.2.1", + "matchCriteriaId": "F4F7646D-0677-4FE5-B4B1-3F10F068A625" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/noxlumens/Vulnerability-Research/tree/main/CVE-2024-56918", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://youtu.be/GC8-PUlu2i8?si=cd_dSVno93pCisr-&t=103", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://youtu.be/zBbjNNK79pg", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24290.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24290.json index ac150bb1f03..204a051dfa0 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24290.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24290.json @@ -2,13 +2,17 @@ "id": "CVE-2025-24290", "sourceIdentifier": "support@hackerone.com", "published": "2025-06-29T20:15:24.930", - "lastModified": "2025-06-29T20:15:24.930", + "lastModified": "2025-06-30T15:15:23.027", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple Authenticated SQL Injection vulnerabilities found in UISP Application (Version 2.4.206 and earlier) could allow a malicious actor with low privileges to escalate privileges." + }, + { + "lang": "es", + "value": "Varias vulnerabilidades de inyecci\u00f3n SQL autenticada encontradas en UISP Application (versi\u00f3n 2.4.206 y anteriores) podr\u00edan permitir que un actor malicioso con bajos privilegios aumente sus privilegios." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-048-048/af007d99-bb6d-4368-a12f-75e84de19e8d", diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2895.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2895.json new file mode 100644 index 00000000000..bd0cbda4cb7 --- /dev/null +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2895.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-2895", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-06-30T15:15:23.133", + "lastModified": "2025-06-30T15:15:23.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, 2.3.4.1, and 2.3.4.1 iFix1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7237164", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-328xx/CVE-2025-32897.json b/CVE-2025/CVE-2025-328xx/CVE-2025-32897.json index 7a4aacdaa19..ad87bb64fe9 100644 --- a/CVE-2025/CVE-2025-328xx/CVE-2025-32897.json +++ b/CVE-2025/CVE-2025-328xx/CVE-2025-32897.json @@ -2,20 +2,47 @@ "id": "CVE-2025-32897", "sourceIdentifier": "security@apache.org", "published": "2025-06-28T19:15:21.917", - "lastModified": "2025-06-28T19:15:21.917", + "lastModified": "2025-06-30T15:15:23.310", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Apache Seata (incubating).\n\nThis security vulnerability is the same as CVE-2024-47552, but the version range described in the CVE-2024-47552 definition is too narrow.\nThis issue affects Apache Seata (incubating): from 2.0.0 before 2.3.0.\n\nUsers are recommended to upgrade to version 2.3.0, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Apache Seata (en desarrollo). Esta vulnerabilidad de seguridad es similar a la CVE-2024-47552, pero el rango de versiones descrito en la definici\u00f3n de CVE-2024-47552 es demasiado limitado. Este problema afecta a Apache Seata (en desarrollo): desde la versi\u00f3n 2.0.0 hasta la 2.3.0. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.3.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-455xx/CVE-2025-45529.json b/CVE-2025/CVE-2025-455xx/CVE-2025-45529.json index 3103f5eee5c..df50a5fb1cd 100644 --- a/CVE-2025/CVE-2025-455xx/CVE-2025-45529.json +++ b/CVE-2025/CVE-2025-455xx/CVE-2025-45529.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45529", "sourceIdentifier": "cve@mitre.org", "published": "2025-05-27T19:15:25.763", - "lastModified": "2025-05-28T15:01:30.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-06-30T15:24:44.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sscms:siteserver_cms:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3DEF8662-8E5A-4177-B5ED-54EB63B05509" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/sec-Kode/000fbab6dc649888bc196e76a4076b57", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/sec-Kode/cve/blob/main/cve2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-460xx/CVE-2025-46014.json b/CVE-2025/CVE-2025-460xx/CVE-2025-46014.json index 5e7d58e4a58..87d53443f93 100644 --- a/CVE-2025/CVE-2025-460xx/CVE-2025-46014.json +++ b/CVE-2025/CVE-2025-460xx/CVE-2025-46014.json @@ -2,16 +2,59 @@ "id": "CVE-2025-46014", "sourceIdentifier": "cve@mitre.org", "published": "2025-06-30T02:15:21.077", - "lastModified": "2025-06-30T02:15:21.077", + "lastModified": "2025-06-30T15:15:23.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Several services in Honor Device Co., Ltd Honor PC Manager v16.0.0.118 was discovered to connect services to the named pipe iMateBookAssistant with default or overly permissive security attributes, leading to a privilege escalation." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que varios servicios en Honor Device Co., Ltd Honor PC Manager v16.0.0.118 conectaban servicios a la tuber\u00eda con nombre iMateBookAssistant con atributos de seguridad predeterminados o demasiado permisivos, lo que provocaba una escalada de privilegios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/HonorPCManager-PrivEsc", diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6908.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6908.json index 20f39668699..202f019e100 100644 --- a/CVE-2025/CVE-2025-69xx/CVE-2025-6908.json +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6908.json @@ -2,7 +2,7 @@ "id": "CVE-2025-6908", "sourceIdentifier": "cna@vuldb.com", "published": "2025-06-30T13:15:32.133", - "lastModified": "2025-06-30T13:15:32.133", + "lastModified": "2025-06-30T15:15:23.970", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.604928", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/91", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6911.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6911.json new file mode 100644 index 00000000000..1ae8bab788c --- /dev/null +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6911.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2025-6911", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-30T15:15:24.310", + "lastModified": "2025-06-30T15:15:24.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Student Record System 3.2. It has been declared as critical. This vulnerability affects unknown code of the file /manage-subjects.php. The manipulation of the argument del leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/94", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.314404", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.314404", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605076", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/f1rstb100d/myCVE/issues/94", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-69xx/CVE-2025-6912.json b/CVE-2025/CVE-2025-69xx/CVE-2025-6912.json new file mode 100644 index 00000000000..a170910004f --- /dev/null +++ b/CVE-2025/CVE-2025-69xx/CVE-2025-6912.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6912", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-30T15:15:24.510", + "lastModified": "2025-06-30T15:15:24.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PHPGurukul Student Record System 3.2. It has been rated as critical. This issue affects some unknown processing of the file /manage-students.php. The manipulation of the argument del leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/f1rstb100d/myCVE/issues/95", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.314405", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.314405", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.605077", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index de44600a996..9c3c7d8b22f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-30T14:26:59.883158+00:00 +2025-06-30T16:00:11.385363+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-30T14:26:28.500000+00:00 +2025-06-30T15:24:44.787000+00:00 ``` ### Last Data Feed Release @@ -27,40 +27,55 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-06-27T00:00:04.323263+00:00 +2025-06-30T14:32:06.616569+00:00 ``` ### Total Number of included CVEs ```plain -299883 +299888 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `5` -- [CVE-2025-6909](CVE-2025/CVE-2025-69xx/CVE-2025-6909.json) (`2025-06-30T14:15:25.083`) -- [CVE-2025-6910](CVE-2025/CVE-2025-69xx/CVE-2025-6910.json) (`2025-06-30T14:15:25.343`) +- [CVE-2023-47310](CVE-2023/CVE-2023-473xx/CVE-2023-47310.json) (`2025-06-30T15:15:22.493`) +- [CVE-2024-53621](CVE-2024/CVE-2024-536xx/CVE-2024-53621.json) (`2025-06-30T15:15:22.727`) +- [CVE-2025-2895](CVE-2025/CVE-2025-28xx/CVE-2025-2895.json) (`2025-06-30T15:15:23.133`) +- [CVE-2025-6911](CVE-2025/CVE-2025-69xx/CVE-2025-6911.json) (`2025-06-30T15:15:24.310`) +- [CVE-2025-6912](CVE-2025/CVE-2025-69xx/CVE-2025-6912.json) (`2025-06-30T15:15:24.510`) ### CVEs modified in the last Commit -Recently modified CVEs: `13` +Recently modified CVEs: `27` -- [CVE-2024-22014](CVE-2024/CVE-2024-220xx/CVE-2024-22014.json) (`2025-06-30T14:26:28.500`) -- [CVE-2024-25343](CVE-2024/CVE-2024-253xx/CVE-2024-25343.json) (`2025-06-30T14:06:29.553`) -- [CVE-2024-30219](CVE-2024/CVE-2024-302xx/CVE-2024-30219.json) (`2025-06-30T14:22:16.677`) -- [CVE-2024-30220](CVE-2024/CVE-2024-302xx/CVE-2024-30220.json) (`2025-06-30T14:22:06.540`) -- [CVE-2024-31755](CVE-2024/CVE-2024-317xx/CVE-2024-31755.json) (`2025-06-30T14:15:29.117`) -- [CVE-2024-32404](CVE-2024/CVE-2024-324xx/CVE-2024-32404.json) (`2025-06-30T14:11:32.800`) -- [CVE-2024-32406](CVE-2024/CVE-2024-324xx/CVE-2024-32406.json) (`2025-06-30T14:11:02.940`) -- [CVE-2024-33671](CVE-2024/CVE-2024-336xx/CVE-2024-33671.json) (`2025-06-30T14:25:03.890`) -- [CVE-2024-33673](CVE-2024/CVE-2024-336xx/CVE-2024-33673.json) (`2025-06-30T14:22:57.057`) -- [CVE-2025-1634](CVE-2025/CVE-2025-16xx/CVE-2025-1634.json) (`2025-06-30T14:15:23.023`) -- [CVE-2025-24292](CVE-2025/CVE-2025-242xx/CVE-2025-24292.json) (`2025-06-30T14:15:23.483`) -- [CVE-2025-53391](CVE-2025/CVE-2025-533xx/CVE-2025-53391.json) (`2025-06-30T14:15:24.623`) -- [CVE-2025-53392](CVE-2025/CVE-2025-533xx/CVE-2025-53392.json) (`2025-06-30T14:15:24.803`) +- [CVE-2024-20312](CVE-2024/CVE-2024-203xx/CVE-2024-20312.json) (`2025-06-30T15:21:14.327`) +- [CVE-2024-23335](CVE-2024/CVE-2024-233xx/CVE-2024-23335.json) (`2025-06-30T15:03:32.623`) +- [CVE-2024-23336](CVE-2024/CVE-2024-233xx/CVE-2024-23336.json) (`2025-06-30T15:10:32.987`) +- [CVE-2024-28056](CVE-2024/CVE-2024-280xx/CVE-2024-28056.json) (`2025-06-30T14:40:14.440`) +- [CVE-2024-28871](CVE-2024/CVE-2024-288xx/CVE-2024-28871.json) (`2025-06-30T14:54:40.080`) +- [CVE-2024-29007](CVE-2024/CVE-2024-290xx/CVE-2024-29007.json) (`2025-06-30T15:05:20.587`) +- [CVE-2024-29008](CVE-2024/CVE-2024-290xx/CVE-2024-29008.json) (`2025-06-30T15:00:30.947`) +- [CVE-2024-30256](CVE-2024/CVE-2024-302xx/CVE-2024-30256.json) (`2025-06-30T14:30:00.660`) +- [CVE-2024-33775](CVE-2024/CVE-2024-337xx/CVE-2024-33775.json) (`2025-06-30T15:22:14.757`) +- [CVE-2024-36048](CVE-2024/CVE-2024-360xx/CVE-2024-36048.json) (`2025-06-30T15:21:31.767`) +- [CVE-2024-36383](CVE-2024/CVE-2024-363xx/CVE-2024-36383.json) (`2025-06-30T15:22:59.717`) +- [CVE-2024-40750](CVE-2024/CVE-2024-407xx/CVE-2024-40750.json) (`2025-06-30T15:15:24.097`) +- [CVE-2024-47226](CVE-2024/CVE-2024-472xx/CVE-2024-47226.json) (`2025-06-30T14:50:07.543`) +- [CVE-2024-48286](CVE-2024/CVE-2024-482xx/CVE-2024-48286.json) (`2025-06-30T15:15:59.560`) +- [CVE-2024-54772](CVE-2024/CVE-2024-547xx/CVE-2024-54772.json) (`2025-06-30T14:48:12.073`) +- [CVE-2024-54952](CVE-2024/CVE-2024-549xx/CVE-2024-54952.json) (`2025-06-30T14:46:38.763`) +- [CVE-2024-56915](CVE-2024/CVE-2024-569xx/CVE-2024-56915.json) (`2025-06-30T14:44:36.367`) +- [CVE-2024-56916](CVE-2024/CVE-2024-569xx/CVE-2024-56916.json) (`2025-06-30T14:43:46.500`) +- [CVE-2024-56917](CVE-2024/CVE-2024-569xx/CVE-2024-56917.json) (`2025-06-30T14:44:01.510`) +- [CVE-2024-56918](CVE-2024/CVE-2024-569xx/CVE-2024-56918.json) (`2025-06-30T14:42:40.747`) +- [CVE-2025-24290](CVE-2025/CVE-2025-242xx/CVE-2025-24290.json) (`2025-06-30T15:15:23.027`) +- [CVE-2025-32897](CVE-2025/CVE-2025-328xx/CVE-2025-32897.json) (`2025-06-30T15:15:23.310`) +- [CVE-2025-45529](CVE-2025/CVE-2025-455xx/CVE-2025-45529.json) (`2025-06-30T15:24:44.787`) +- [CVE-2025-46014](CVE-2025/CVE-2025-460xx/CVE-2025-46014.json) (`2025-06-30T15:15:23.493`) +- [CVE-2025-6908](CVE-2025/CVE-2025-69xx/CVE-2025-6908.json) (`2025-06-30T15:15:23.970`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bc19ac9d2e9..8413af605f2 100644 --- a/_state.csv +++ b/_state.csv @@ -237122,7 +237122,7 @@ CVE-2023-46007,0,0,4d8bd4276a6f33014e5cccd18af44c94accfc3d0d1060f127e226770cd392 CVE-2023-46009,0,0,8d5d3efe4904e9ed396a360bc3df9ca49b5c7f9c24b84c3731c898ca6af2cd25,2024-11-21T08:27:44.953000 CVE-2023-4601,0,0,728105d909686857ff780a9b66797b36d27e19a5c92219c114bd2d57b23068da,2024-11-21T08:35:31.263000 CVE-2023-46010,0,0,a760334e735bf57366f51786ed934ace6ba2334c716b4e9eb441d666baa13d56,2024-11-21T08:27:45.110000 -CVE-2023-46012,0,0,2016223adb3bbf483d47e82168fe465164e64c855db4b9a4dcfedc73ae34b506,2025-03-14T02:15:12.757000 +CVE-2023-46012,0,1,ecc223c2a6fafdc9017a47680c314114758dfbb8eb3889bafa4cba12718ca375,2025-06-30T15:13:28.630000 CVE-2023-46014,0,0,c1f473e034f1b720c68866b0246e6628e08d7fea94c3c9f33563183efe72b624,2024-11-21T08:27:45.480000 CVE-2023-46015,0,0,6ec7272e35ed39f95a30c44def938c7a1ceb6ac3b9cde73bfc674dee461563d4,2024-11-21T08:27:45.650000 CVE-2023-46016,0,0,63b81b039c3c6d3fe51e8f665338c7f5ffbb44c8095a2fa0358f7c9c87226ef7,2024-11-21T08:27:45.800000 @@ -238172,6 +238172,7 @@ CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b87 CVE-2023-47308,0,0,7d5ff54c309fa19adc9e793bda18cb0b740ceb6c9d3315a532ce40f5c4fd1165,2024-11-21T08:30:07.870000 CVE-2023-47309,0,0,24c2011ecb6d7db56739e87951b446acfc2502ed2d4ef1d44fda31d0f3b47ac3,2024-11-21T08:30:08.030000 CVE-2023-4731,0,0,d05232eed0c052dd2a1d5ec6b0be8f9b495ae5a2bd0ca62433c506bf8c986847,2025-01-15T16:31:04.880000 +CVE-2023-47310,1,1,8993e802247daefbc7e2827774853725dec479efcc15ab06e893221fb280a062,2025-06-30T15:15:22.493000 CVE-2023-47311,0,0,b95c9f4ee7ff54f1db61b336a25ed1ed49149c6e779141e5eaa4ce520fe1e575,2024-11-21T08:30:08.283000 CVE-2023-47312,0,0,42944cc44c110aadfec0e3ea54804d471daddba94144037ba9fb032325e0ea39,2024-11-21T08:30:08.460000 CVE-2023-47313,0,0,263f2c0543bd5ec30e1b2e45eebc7a95f0ea67b86f319d05fa2226679d75307f,2024-11-21T08:30:08.597000 @@ -250310,12 +250311,12 @@ CVE-2024-20304,0,0,f59929d4ee2b44d7536f77812cb12006cdc47f7a16a595b1606514d6161e0 CVE-2024-20305,0,0,bf4e229eeb86abd621b631185424994199aa8e5f1ce1ee169d81b389eb9114cb,2024-11-21T08:52:18.450000 CVE-2024-20306,0,0,da88e22d1c02be9fdc6cbfe89db5d7e8af86893f16e7fe87e6872b4543960bd7,2024-11-21T08:52:18.600000 CVE-2024-20307,0,0,601b50e63106903bdc8774c59e9ce5d6e44c1e420e6e2a0916a5899f36f7a7cb,2024-11-21T08:52:18.737000 -CVE-2024-20308,0,0,a198d9a5830ad55d4515f19c5dacac017f121cba3c44155e75db528d1c98a805,2024-11-26T16:15:12.960000 +CVE-2024-20308,0,1,d1518cb74f817f77221bb7afc62bf7c6ac14ce3b22dd7d8b7f382166c0376518,2025-06-30T15:13:39.897000 CVE-2024-20309,0,0,4db169b8df55ce9ef7728bc6ce44c7b86a5a4e680a0cde09a602bf1399efb941,2024-11-21T08:52:19.290000 CVE-2024-2031,0,0,bab788affd7bc170d09eebf7b2936381d311fddd48a21ea76b7423049da3c18b,2025-03-13T01:12:05.833000 CVE-2024-20310,0,0,b5320a73716791169e180b2e1614f680f6f9923c6656228c3dc9ca187d070893,2024-11-21T08:52:19.497000 CVE-2024-20311,0,0,53b383d7383e9e3e537e817f6aac5140fa98d7170f0e570bca350aef715ae1d5,2024-11-21T08:52:19.683000 -CVE-2024-20312,0,0,f5fcf951f7e90ad8a1dec51aecd1f26e20d95e89d5208b503227941cfee15de6,2024-11-21T08:52:20.100000 +CVE-2024-20312,0,1,ecb1edffdd8d0fc50bb84b1c0832d7e759a467fda651959807d9681381b1a514,2025-06-30T15:21:14.327000 CVE-2024-20313,0,0,e0e15a530c0689a3762c376983b46e938a357d447cb246349107cc0b204d199d,2024-11-21T08:52:20.890000 CVE-2024-20314,0,0,0d8e380300e50c4866522f51126c3f734eaebdd9d9fc59ebeee7a03e63e06ebb,2024-11-21T08:52:21.060000 CVE-2024-20315,0,0,7d966db225cabf76c83361d4e7be47d53fbea678ec97467156623f2f786cebc5,2024-11-21T08:52:21.273000 @@ -251877,7 +251878,7 @@ CVE-2024-22010,0,0,8d9c2af8232a04979125c301bde0e0e33e9ef004f7a735afb9496b11f7478 CVE-2024-22011,0,0,96c1fc7a4596546c5429b0a68245714dac2517f8d18ad519b95b50d7e93d1612,2025-03-26T21:15:21.553000 CVE-2024-22012,0,0,88165b48b4e490918e0710c9bc3ca6d32b1c2def519419a3f2ddc2bd409c5c89,2025-05-08T19:15:57.907000 CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000 -CVE-2024-22014,0,1,aa6df7d6dc43aafd6fc00b314d40595a6761891fba6f4344dbac03553c44091f,2025-06-30T14:26:28.500000 +CVE-2024-22014,0,0,aa6df7d6dc43aafd6fc00b314d40595a6761891fba6f4344dbac03553c44091f,2025-06-30T14:26:28.500000 CVE-2024-22015,0,0,528b7fc21429577c21dd43b5ff69c927566544892694f980e105e1473c6f6c62,2024-11-21T08:55:23.797000 CVE-2024-22016,0,0,e61d53ad48de566e671c4870524f86981cc84cd4ff147249779157ec803d6562,2024-11-21T08:55:23.953000 CVE-2024-22017,0,0,f8ddd81dce3bf81896e81991f007af8de38ff2bc2bdfa1774945eaac4d130654,2024-11-21T08:55:24.130000 @@ -252804,8 +252805,8 @@ CVE-2024-23331,0,0,d249684f95243c86cd9ac165298c6d83c767bd88a7562199924aa7b584973 CVE-2024-23332,0,0,d71e1782a43b90e8f3c6045284fd1374fc8749a7455b52cacdef33d8b65d9b8d,2024-11-21T08:57:31.710000 CVE-2024-23333,0,0,0ce507d9128043e9140244402c880eb4e81dce5a3ce65cedad46c5c7e37a048a,2024-11-21T08:57:31.867000 CVE-2024-23334,0,0,24e22a9f85144a6eb80a966dfeee736b72688dbc715298232762b9057f0067b8,2024-11-21T08:57:32.007000 -CVE-2024-23335,0,0,de7f349b152f92f737c021e47e0cabdc50557a944e31259bc2e405bafe42a824,2024-11-21T08:57:32.177000 -CVE-2024-23336,0,0,4abac73264efb3ee98b509450e97c2c3efefdddaa6ba486ed0dee4b6115d0057,2024-11-21T08:57:32.330000 +CVE-2024-23335,0,1,932d82455042117085b3080e11b9b54b5b2fe8e5dbfad1c868507271da7c8fa8,2025-06-30T15:03:32.623000 +CVE-2024-23336,0,1,6a849eeb4c465c817af539ae158a9eeb3ebef70010df83b5e2d70eaa9acc7f6d,2025-06-30T15:10:32.987000 CVE-2024-23337,0,0,4812a44cfcfaeff19ddf932df8105410d7b53fea8400702d0e5bf6b82a124a3c,2025-06-20T17:41:15.807000 CVE-2024-23338,0,0,f58e3dae5cf0c4c68340ef9b15d9086b7094eb5eb8c170306769557f46f11afe,2025-03-28T22:15:16.150000 CVE-2024-23339,0,0,4ed8c1a7853a803ffbe035c0abd3aa76c7fa65b36f181c9915b990b81e7293ca,2024-11-21T08:57:32.477000 @@ -254298,7 +254299,7 @@ CVE-2024-25327,0,0,200c2b510342a3e155d5c5aae84c1549b1fe17451fa1d4b0fa553a648fd4f CVE-2024-2533,0,0,6ae2130a2853cfc35a0325db37738d70d71a25805f631d6422b528a071b1e72e,2025-03-03T16:49:51.433000 CVE-2024-25331,0,0,2b5df9bf20f2ad2788f6bfc10fc6e2710ebce7c5b2ae509b177bc3eeb5d61cac,2024-11-21T09:00:39.057000 CVE-2024-2534,0,0,f24633e3eff1520ce3c2eedeed339e97d80233d79efd834bb5b9d5ffd097cfc8,2025-03-03T16:45:52.740000 -CVE-2024-25343,0,1,e3b01a3e47d461bb19d4a2757314cce0c75401bbb6aa8dd7e74cfa1adf0fb398,2025-06-30T14:06:29.553000 +CVE-2024-25343,0,0,e3b01a3e47d461bb19d4a2757314cce0c75401bbb6aa8dd7e74cfa1adf0fb398,2025-06-30T14:06:29.553000 CVE-2024-25344,0,0,1d37f417b2857c3f92d549197061b03ca0a3c30434d1771e1f176d151c26b4a1,2025-04-25T19:04:02.670000 CVE-2024-2535,0,0,0bf848903fc38663f407d2d981ac3254e4cae4551d368c29ada205f88200bdc8,2025-03-03T17:08:17.677000 CVE-2024-25350,0,0,4475b2cde03dfd1b78deacd34e1c6eded8bdb8d6a390fd1c3a4b68cda68ace07,2025-03-27T15:09:10.017000 @@ -256537,7 +256538,7 @@ CVE-2024-28051,0,0,de198a0eafa66377d1b1913e11ab30e60d08fcf78e4d7e0f859604a31b006 CVE-2024-28052,0,0,c091e5a10488583b0029fed7f1a8e4d1e6cdb2795bd026298532c166c3b5f4bd,2024-11-21T09:05:42.417000 CVE-2024-28053,0,0,9d049b1d60f930519827e1044a4f3fd31b9f0d3b4e2dc36c85f114fc799f4e7b,2024-12-13T17:04:25.663000 CVE-2024-28054,0,0,fa08065bd648393ce8106d68a1c22c495344465ae4a1ec5efff8e744f6459d7b,2025-03-27T15:15:51.183000 -CVE-2024-28056,0,0,54ec43d2bd6a1e03728ecaf459c1f7b68dccb34954269202c18491a26f12d2d7,2025-03-20T19:15:28.160000 +CVE-2024-28056,0,1,fcff5722866de62d2d3b446f843367f5f01f73092f2fe89f1bd3572396a58a00,2025-06-30T14:40:14.440000 CVE-2024-28058,0,0,787a78d70d26214b6983cf8dcf8276db60e674f375fc2818e93317905b7a88a2,2024-11-21T17:15:12.207000 CVE-2024-2806,0,0,4d6f6543e89281b6263f8cf8af7cacf5366694bd179ef044fb7a7b3d27de5f3b,2024-11-21T09:10:33.937000 CVE-2024-28060,0,0,430e9cb50592c0e24fcf0b0a6df7fab52ef15ed2b5618838340295f89086c9cc,2025-05-30T16:15:37.183000 @@ -257040,7 +257041,7 @@ CVE-2024-28868,0,0,eb611e363be714e3967489367b2768d2aad8d5b204059d84423a8d33f9241 CVE-2024-28869,0,0,37b1b2db8728242f0e02311908952ceff63256ca368c823beb03f1803daff4a5,2024-11-21T09:07:04.857000 CVE-2024-2887,0,0,2151745dcd1daf556cb13d574e9eac547b9e2e36f2c3f34a1c838383696c4f69,2025-03-28T20:15:22.407000 CVE-2024-28870,0,0,fd666a29a4cdc30a1bbf0c2ca08eb94fda907da7241920daffa095d89f5c41fe,2025-04-28T16:43:27.213000 -CVE-2024-28871,0,0,66beb860b668b240441f397870a5def3e52a27283cc1f106699d7ed5d3fb58ea,2024-11-21T09:07:05.180000 +CVE-2024-28871,0,1,9fb35397b5703a2424c95885bbf22334825ce5c7efd04d5f3bee1ee399f24e15,2025-06-30T14:54:40.080000 CVE-2024-28872,0,0,efd605e2b04b121c2231623009b4fa909abf78c19ec3893f1988cbfc577adb70,2025-03-26T15:15:49.380000 CVE-2024-28875,0,0,4dfb9c16f5bf82bf68888163d531fb859006c6398976e17b2766ff7841ca461a,2024-11-13T18:10:05.647000 CVE-2024-28876,0,0,275454f6648ae48abb7dd0bb2572cfbc3374f282a0e739572d5d9f74b7aeb1a2,2024-09-06T18:35:00.337000 @@ -257173,8 +257174,8 @@ CVE-2024-29001,0,0,6fc82a6f335f3c5662579fa4bd43a81249ae490e4f8e2e26c0e39a12e19cd CVE-2024-29003,0,0,8eb3860946e379c345ffc0d82ffcc3fa9093dd59c57f1838dd5ab8d2f9a38c1d,2025-02-26T18:46:56.310000 CVE-2024-29004,0,0,8446272ff6c6520c3561fc5cc637690841bb3c06810fde039230c89325966c27,2025-02-26T18:47:06.700000 CVE-2024-29006,0,0,09d3a39109b536781008f59da0cfe8dc4e1f9f87172f276e502e52b38fb6a60b,2025-03-27T20:15:25.687000 -CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000 -CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000 +CVE-2024-29007,0,1,7a86dc551817cfa356f5ed10f3f6af0e1988ff955afd32dd191061e59836a046,2025-06-30T15:05:20.587000 +CVE-2024-29008,0,1,b5831d29540172edf7046e4842955fe0cc3096b69e6746f3a94242ebb8e3bde6,2025-06-30T15:00:30.947000 CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000 CVE-2024-2901,0,0,4a7aeac7c015447d111eabc56ba2b8138e6c83716ab3368b8919f39c2cca4f05,2025-01-22T17:51:47.007000 CVE-2024-29010,0,0,4dbbb313be40d0c135584395796085f49dfc5a38f9b20d53ef797f5c9a7732c3,2024-11-21T09:07:22.030000 @@ -258077,9 +258078,9 @@ CVE-2024-30215,0,0,a1b0f900cb62de925491aed41f5921b94f9df9f244b21ce8ccb9eca6d15f7 CVE-2024-30216,0,0,b347f4e1cd688789ece90c7e9f749d8a81a14f518a018cb6e704a8c4efadc5e6,2024-11-21T09:11:27.933000 CVE-2024-30217,0,0,8b1ee13cb508bb6c80692072b22edbe0b22fa8c14c399fe6c5445c20f26e9f96,2024-11-21T09:11:28.067000 CVE-2024-30218,0,0,62ab1357959cfbcc7eb28f53243d1a18228ff767f9cfec29cd8382365b686eb9,2024-11-21T09:11:28.190000 -CVE-2024-30219,0,1,69446f928f7c6c0828561f636ccbee8b4547c7b47fce36c15f795287a53f1528,2025-06-30T14:22:16.677000 +CVE-2024-30219,0,0,69446f928f7c6c0828561f636ccbee8b4547c7b47fce36c15f795287a53f1528,2025-06-30T14:22:16.677000 CVE-2024-3022,0,0,c0b2ab18f4ddf27bd1888310fcf31460b206066adf8181fccf29aff5b55609b6,2025-03-13T01:38:18.387000 -CVE-2024-30220,0,1,d1a2a03d425115136f07683f804c002d68e9ebde653c9ab7441b076617abf748,2025-06-30T14:22:06.540000 +CVE-2024-30220,0,0,d1a2a03d425115136f07683f804c002d68e9ebde653c9ab7441b076617abf748,2025-06-30T14:22:06.540000 CVE-2024-30221,0,0,2bf4e4f630b8564c6ce7ebaed368d2ce0987c09bd88d0b53cd40b4e16957d1c5,2025-04-08T16:40:47.867000 CVE-2024-30222,0,0,2acbf9926170b6928bfebb087e84997bd435a46d9a573e64828b16eddfc1cfcd,2025-05-29T20:32:56.797000 CVE-2024-30223,0,0,1b115c948d97b97bfc97e8597ecbd8f244b6fa404d47a4f00a9c6f0d86f485e2,2025-05-29T20:30:31.620000 @@ -258118,7 +258119,7 @@ CVE-2024-30252,0,0,8b3d976aa65c8aec664fdfec496f8225de753f3f7160d8da85d65bd4c8eab CVE-2024-30253,0,0,bc4506e5c3b7edd4c1da781f36ecd0afb5af25de6210cbbced76946549d2f93c,2024-11-21T09:11:32.927000 CVE-2024-30254,0,0,35546b7409e4119ccffeb76af2517fdc522bbad8073913d5b4579ec29c98ca9e,2024-11-21T09:11:33.107000 CVE-2024-30255,0,0,78b182f0b7f2b08d83e6ce349e002956760de0eeeb0dd012f4a2379fb98daaa1,2024-11-21T09:11:33.297000 -CVE-2024-30256,0,0,8642d5a4ce4d5d68a9754f13f7ba74215b6e90771f5838567192e595626d6804,2024-11-21T09:11:33.873000 +CVE-2024-30256,0,1,57a135dda425255e994973373bd2cd20f8632968a1c6037a07340df158a9aa12,2025-06-30T14:30:00.660000 CVE-2024-30257,0,0,0845865de494d27d5f9f6f263c73629509cc017f68c837b3079abf330502dab0,2025-02-11T17:46:01.247000 CVE-2024-30258,0,0,0b28c3da41152db30482ad37add74c4e5433dcd898c75859cafa934294374ca7,2025-01-27T18:19:29.930000 CVE-2024-30259,0,0,675b93802531aba4e1319c2e7eb03e13e1b91c93708bf98d69707b40712e6f03,2025-01-27T18:16:00.440000 @@ -259242,7 +259243,7 @@ CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7e CVE-2024-31747,0,0,1ff83f224bdbf8af1f9f4bcb86a91e1f678c13094ae1a77fdf1fd657baea901e,2024-11-21T09:13:50.523000 CVE-2024-3175,0,0,5f6302a6462e73c7261678b54271c3937e1258b7b4f3007957ea22e83fdb94e8,2024-11-21T09:29:04.757000 CVE-2024-31750,0,0,f96eb8e3bbed78e55e09766d655b63a754ae5a7049972e728e16ce77deb482bc,2025-06-10T01:32:26.340000 -CVE-2024-31755,0,1,08a16c97f349722aeb622843685593aa4f1a8356483fc4e7bc0a073f6a4ff7fd,2025-06-30T14:15:29.117000 +CVE-2024-31755,0,0,08a16c97f349722aeb622843685593aa4f1a8356483fc4e7bc0a073f6a4ff7fd,2025-06-30T14:15:29.117000 CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000 CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000 CVE-2024-31759,0,0,05e1f4131e61d4f0ada0c5e7d6b8aab829a17b3404edb68b414001697214f750,2025-06-12T23:43:02.223000 @@ -259689,9 +259690,9 @@ CVE-2024-32392,0,0,330afcb85bc3b2e0ad48bdcfefc0946f06dfd671d9ada4abd359a61c88627 CVE-2024-32394,0,0,fcd63d75d4da407251404a1d2d08afc172eff51aa3e4e8bae9c2e181b13c6815,2024-11-22T16:15:22.317000 CVE-2024-32399,0,0,451fd8b2233e189ac161bb1115242ec61a34c2ccc4b6f8530cbfaeecf7c2697b,2024-11-21T09:14:52.160000 CVE-2024-3240,0,0,971173d54c1994d6b1cfc2e3e8433d0c58e5901156fde410070d2514a513396a,2024-11-21T09:29:13.397000 -CVE-2024-32404,0,1,b4ba0adf593d37cfb68aa1c9c31ca81eb77e945e8c5e77ac96a474bc32d8b75d,2025-06-30T14:11:32.800000 +CVE-2024-32404,0,0,b4ba0adf593d37cfb68aa1c9c31ca81eb77e945e8c5e77ac96a474bc32d8b75d,2025-06-30T14:11:32.800000 CVE-2024-32405,0,0,03b8b3b387fd90d2d3e2e81b9e088d252ad26d5ebcb2d54e41548bc8a9a694ff,2025-06-13T16:10:19.593000 -CVE-2024-32406,0,1,46b160fd713a4cf4c08eb54dd14a0872ddae158fdce801e0f78117febe9138c3,2025-06-30T14:11:02.940000 +CVE-2024-32406,0,0,46b160fd713a4cf4c08eb54dd14a0872ddae158fdce801e0f78117febe9138c3,2025-06-30T14:11:02.940000 CVE-2024-32407,0,0,69b4d3bff3264ca20ca024b87ba188215e92e6004de70e7b110ab1314abf0286,2025-06-13T16:11:59.863000 CVE-2024-32409,0,0,bf9e59848caae45d0cc6872d258056c0c656eeada01f508a560f9f71f7f2c3bf,2025-04-04T13:23:40.187000 CVE-2024-3241,0,0,99a869aa2cdccb45dc97a20b04d1a56e494390a52ac89cc6fa2586d94a876e7a,2025-05-14T16:47:45.590000 @@ -260731,9 +260732,9 @@ CVE-2024-33668,0,0,1962d48d8af4b5fba76a435be45e2426ee0538789dff9bbf199c2122d44ad CVE-2024-33669,0,0,14ac632668cd7a1790904a0dcbe3c48aa1f45ca20bb0c62036cdffd62d89e020,2025-06-18T19:26:21.547000 CVE-2024-3367,0,0,6c0aec54854b096f8e878555e9125762e19df628121d5279f20fc46c0c73cc6e,2024-12-05T14:28:32.407000 CVE-2024-33670,0,0,2cc87f19588498db236ce0af8fa8f9dc28f317a9acfa26ac1fe6f44a0e7a504e,2025-06-18T19:16:31.087000 -CVE-2024-33671,0,1,e2a6ee4d8c26e7c762a99869717890ef61990720cfcf0abb96618e6668bfed21,2025-06-30T14:25:03.890000 +CVE-2024-33671,0,0,e2a6ee4d8c26e7c762a99869717890ef61990720cfcf0abb96618e6668bfed21,2025-06-30T14:25:03.890000 CVE-2024-33672,0,0,8b1650c8b10c28f09a3826e003aa8dee352e02a41ac68246cc28a5b89f1f6f51,2025-06-10T15:32:30.493000 -CVE-2024-33673,0,1,6e36f667c15fedee42d77aae087f11d10e17f3851a21dfb665a95ba3ea59fa36,2025-06-30T14:22:57.057000 +CVE-2024-33673,0,0,6e36f667c15fedee42d77aae087f11d10e17f3851a21dfb665a95ba3ea59fa36,2025-06-30T14:22:57.057000 CVE-2024-33677,0,0,8c026ba50efd58074ee9fc7efbb88e0c06b2f621d30fb1b24c5e8cd3b5e751f3,2024-11-21T09:17:23.230000 CVE-2024-33678,0,0,0354f1d0d3f7ae634b20d321a0a5fe882afb0c2e7d1d7eb371cc2e66e362d410,2024-11-21T09:17:23.353000 CVE-2024-33679,0,0,e524c9549813edbcd9f9689d9ec53c4e7a53a76ee24a04f714dcc734db66079c,2024-11-21T09:17:23.480000 @@ -260780,7 +260781,7 @@ CVE-2024-33771,0,0,f0add2ede557b0082aae42dabf4ed3c8fbc6aa15a6a6905ad64a036368536 CVE-2024-33772,0,0,91ebf0199b77f4fab29c23a278d1f8ef519ea660b4a9fb2413f7104260f44151,2025-05-21T14:42:45.587000 CVE-2024-33773,0,0,034058b04ec93ca6c5edc4f174f8f4df83d661d3c6f32106b0dd0a828f81c868,2025-05-21T14:42:51.290000 CVE-2024-33774,0,0,52b770b7f333615156ba87f01b3cea08102d5ac65159461b358a36f647f81817,2025-05-21T14:42:59.237000 -CVE-2024-33775,0,0,bc597e520cb5802c10bcc9b429b021dd323dfc44b73d29075d59180bbe1246e2,2024-11-21T09:17:28.473000 +CVE-2024-33775,0,1,d4b3865c53f90b6f898a30c8676203f5e115205e3e8e1366f928d8e33fbf31f2,2025-06-30T15:22:14.757000 CVE-2024-3378,0,0,3baf56e09d4e512582bd0fad8896d230d93b23be4ed5cff61b2d7585ee2d7eb6,2024-11-21T09:29:29.847000 CVE-2024-33780,0,0,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000 CVE-2024-33781,0,0,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000 @@ -262596,7 +262597,7 @@ CVE-2024-36042,0,0,147ac5bb36af25609df7c5a206485ff9ee935e0717258835639ec8532ecca CVE-2024-36043,0,0,00a1a26002231c8d734c9833d45a24991429b502146d23df3d35da93eb56d40a,2024-11-25T18:15:12.213000 CVE-2024-36046,0,0,dbd46547d3dec5d0c98da2896a67fc7962c2404b9c30c597494ea1c7fc1fadab,2025-04-10T20:14:10.703000 CVE-2024-36047,0,0,793fcc6c774994a5002b23eb00aa9bbf541b93a5aded3aaa88e32ee8f8c13cae,2025-04-10T16:46:54.717000 -CVE-2024-36048,0,0,6b6c5fd388f3c5986f4cdf4b3e4b8816859ba03c7b47f889f37c2525cf73f654,2024-11-21T09:21:30.610000 +CVE-2024-36048,0,1,6ecfa5c9b23bd7ef7fbfcec4444507c49d07ac486867f94c0ab5945df059f30f,2025-06-30T15:21:31.767000 CVE-2024-36049,0,0,f9b51d86d685dfe1d063607d35006d32c1c838354d8d3473b5b37799f50e9f38,2024-11-21T09:21:30.857000 CVE-2024-3605,0,0,0fb02c5cf2e5e4c98134033d37fca28c8f48589ec9fb82d576232d111aa1b2cb,2024-11-21T09:29:58.370000 CVE-2024-36050,0,0,334c3edf479897eb18d10ff244ec758c79c04135320e5006a062eb155adde898,2025-06-27T12:15:29.660000 @@ -262874,7 +262875,7 @@ CVE-2024-36376,0,0,6461edd50210cfc46752fa81dbb9620b9ae82320c3aec5a0d36aa5f53504f CVE-2024-36377,0,0,5774a42bf73f3c41e6e49520f598d871b1eef9ca509d792dae9a70b2d31b0ce6,2025-01-27T18:44:59.970000 CVE-2024-36378,0,0,30a1d5f4dc7b8e52011f1153e02eb226d7291e6e9dbbb1330ef0047c379e4d6e,2025-01-27T18:45:58.190000 CVE-2024-3638,0,0,a0e603bd5eafd59fbf4eda4332a70f4ff465bab094cf08cc0dfa6cf90aa9b0d0,2024-11-21T09:30:03.273000 -CVE-2024-36383,0,0,dfdcebb9c4ed54272ace1d77d7b46f1144dff670c388870465409c92e750dde7,2024-11-21T09:22:03.837000 +CVE-2024-36383,0,1,3e83d39c8415714be1471e58d178cef1237f51e0848fd46075b31f0f32d15d16,2025-06-30T15:22:59.717000 CVE-2024-36384,0,0,f4773f7602bde7ffb495e2fd0dc61ac13b6a017a351ab9847eb4b0f4191cb10a,2024-11-21T09:22:04.047000 CVE-2024-36387,0,0,cdb9f9c6e4f44e520b8a3f1244c0462cddbb4983a3da124e2c5e7faf4bb4d88f,2024-11-25T18:15:12.440000 CVE-2024-36388,0,0,690f978e1151f8e635cdc2eafce3ee23bbc06cad4b079951035ef356d52a2a72,2025-03-04T18:21:06.710000 @@ -266240,7 +266241,7 @@ CVE-2024-40747,0,0,b3b8914b8b9a85996e2d8bf463cac468303cea99c40d1585111bf5e31727d CVE-2024-40748,0,0,54989feba62ce71f70bf6515734070da30856c2a9b0a6ccf8dca47f41cf8bd36,2025-06-04T20:56:03.253000 CVE-2024-40749,0,0,3e9664b890bb6797495d60a2c43e49abe3e5e67aad7dc6961b26d8b2e948f5fb,2025-06-04T20:55:46.570000 CVE-2024-4075,0,0,833bcdf1e94e68a3124787a445c6156093923f6c04c7c02e13218ced02f9eae9,2025-02-27T17:39:00.143000 -CVE-2024-40750,0,0,c491090d917045d507fa28976c97558943f972457181ebb36c0ba9aa25c97d61,2024-11-22T19:15:07.113000 +CVE-2024-40750,0,1,309e82bd693025aca31f0132ef0cde0377e22f8d0ad4d0a9ac09d4eac8c24cdc,2025-06-30T15:15:24.097000 CVE-2024-40754,0,0,70b4a8750ec4ab34f6c40a9ef9362cb41c8a2241bccc0696bb8518e422734abe,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,6f41301410bb850ac724eb349beb08670550e5e1ae7ac3c04b8cf5e2d874d5bd,2024-11-21T09:42:08.807000 CVE-2024-40761,0,0,98df27f9ab08289b73f70adffa16577ee132bdfd9b5e346e5d494328018c9b31,2024-11-21T09:31:34.510000 @@ -271205,7 +271206,7 @@ CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af CVE-2024-47222,0,0,af35ec2b090f518b0dacc1cf6ad59f97af77926ea86cca3bbe8fde63fb5bf8c9,2025-03-18T21:15:30.377000 CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000 CVE-2024-47224,0,0,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000 -CVE-2024-47226,0,0,0c9114a6d7b06793fb4df4318fa93c3350cc9dd0329f9a1b32db743ff9d392dd,2025-02-10T22:15:35.383000 +CVE-2024-47226,0,1,c0138e86450c00655f37733293efcb457ba59b359e5a8aa33c24e761e24f0271,2025-06-30T14:50:07.543000 CVE-2024-47227,0,0,12cb3d637a00166b3cfe0c18fb70b19ea080bd614b4771496d6beb1981a88cc4,2025-03-25T15:15:22.737000 CVE-2024-4723,0,0,181284b6c997036a8e9487f6d01498e20f407a2bf8f4592e413d9384c6be6c62,2025-02-19T18:33:16.710000 CVE-2024-47238,0,0,3709bb1da472fa14a8861b2d409dfdb7e041dc8d6028f86d52acea12f7a7161a,2025-02-04T15:52:06.230000 @@ -272064,7 +272065,7 @@ CVE-2024-48280,0,0,adcf291220a50a17ee9e62ca57acfd894f81d1920dc855db25c190a8f1957 CVE-2024-48282,0,0,857895f3b579ee3c7817f1f1ae932b57ea8e93e9891d2d40c41472e0b9e3de8a,2025-03-31T17:12:33.610000 CVE-2024-48283,0,0,f9813da5f07adf5eb0b828cacb908c1409eccc65eadc9e494240da0cf6bec055,2025-04-04T14:36:27.653000 CVE-2024-48284,0,0,24131b37e3503d0f88373eeb49e74a1db93f0d1406d2b59ea2afec5f898f0a92,2024-11-19T15:45:55.450000 -CVE-2024-48286,0,0,a2ee2817026e105eca7578f1a1a8fb654da208c74bd3dbf196d7d8b7a43390e8,2024-11-21T21:15:22.483000 +CVE-2024-48286,0,1,b2744ff1701c4e9742e6bd9575d1650242aa76ded7cde1cedf8f5a2d6d3ec310,2025-06-30T15:15:59.560000 CVE-2024-48288,0,0,494a691b25e1aa6801161976e907c245b3d741e9af5a6198aa907820a5c23057,2025-06-24T16:04:52.030000 CVE-2024-48289,0,0,b921205e768bba82b1430cd5c6270a0bd9e403688579c58bd3e67b4bf7d6e4d7,2024-11-04T20:35:09.307000 CVE-2024-48290,0,0,82e5d20156cfa5303ee443ad637debb17563a09e32b9881f878d76599e280044,2024-11-08T19:01:03.880000 @@ -275999,6 +276000,7 @@ CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b3 CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000 CVE-2024-5362,0,0,65cc93fbb06de51acd392fcf91df16bbed3865e6bb98fea60125a3f2dc4dd426,2025-02-10T13:55:46.317000 CVE-2024-53620,0,0,0ec00be95852a0998a14f46021597d58d0eefdd89109b46c5f804a1cf687bc07,2024-11-26T20:15:34.050000 +CVE-2024-53621,1,1,90c2909779bd40de41e2008c8e2ca57dc2b96e2eabcb67121c4e1727b32fa7ba,2025-06-30T15:15:22.727000 CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 CVE-2024-5363,0,0,1a1d04dd62a3d9ceb936776096c694704c071db758e0c336b93f44ac203c6bde,2025-02-10T14:41:03.540000 CVE-2024-53635,0,0,7a67e9e0d9d71b612bd6cfd95f53056a7f326cdca18b0bdba544dd72fd3cefe4,2025-04-04T15:39:01.230000 @@ -276892,7 +276894,7 @@ CVE-2024-54762,0,0,a4972032b68778ca168cb5d10bcf23addecc100bf3dfface8e375ce8e1312 CVE-2024-54763,0,0,35fe6aeaf8ff2a2d9d1415d3e6f03dd3382c26dbe16edd942f9dacbafebc435a,2025-01-07T22:15:30.950000 CVE-2024-54764,0,0,7108368b95c8c33cd12f1a88712752ff55f9a1ed7ed83d67f4ddea2a12f4ec62,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12a49,2025-04-02T14:15:44.820000 -CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000 +CVE-2024-54772,0,1,9c2764a7d9a8d65efe31f21016d25111b0c7522750add75b18cc5cf7397d15bb,2025-06-30T14:48:12.073000 CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000 CVE-2024-54775,0,0,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000 CVE-2024-54779,0,0,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000 @@ -276970,7 +276972,7 @@ CVE-2024-54938,0,0,c878de568d97e81472b2e2bc76f9138e19a134b16c42a02a72c8949cbd1a0 CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cff0,2024-12-26T16:38:51.957000 CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000 CVE-2024-54951,0,0,5d19b9002b3d609d782a9b71d0927437769cc7cbd3c6535e97fd8da5cd4a41ad,2025-02-14T16:15:34.060000 -CVE-2024-54952,0,0,0e17effbe40c2ff5d4aedbaa22264ddc30967779ff81f53f33ab36e15aed3666,2025-05-30T16:31:03.107000 +CVE-2024-54952,0,1,3ba3cbe5abd29d54d060f58fc9f2a8729d0e932da40d3d524d3a592774828186,2025-06-30T14:46:38.763000 CVE-2024-54954,0,0,bd6322507b33dbf7676b3d047db7e71ad46212f09cfe0c196ceeabe7a1c0b796,2025-03-28T16:49:01.760000 CVE-2024-54957,0,0,e4e8d12c7fc7d58c0714df01efc15cd62969d1708fd6892bccb61bf01ac33284,2025-03-03T16:15:38.450000 CVE-2024-54958,0,0,05aa071d04d451a63fdeb28f8fd1c549b9935b77ac20404b5acdb6c9e76ec452,2025-02-21T22:15:12.440000 @@ -278105,10 +278107,10 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7 CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000 CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000 CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000 -CVE-2024-56915,0,0,d8173456d344098b22a75a2e02b37206a45f8c92928962510f8649ef655b139d,2025-06-26T18:57:43.670000 -CVE-2024-56916,0,0,1149fd211087d85a318b511ca9b03e86e78c294bf7a379ee7f080a03243aa2ac,2025-06-26T18:58:14.280000 -CVE-2024-56917,0,0,35b68b56acb4ef851f62dcce08e7049f3f145c8bf0ee8052af36e74efca6a164,2025-06-26T18:58:14.280000 -CVE-2024-56918,0,0,1383b146b909c8e519d91b8742ed0dac68c31bc0f2ade4e0f82fb7d912e8e0a9,2025-06-26T18:58:14.280000 +CVE-2024-56915,0,1,d02095b4e7ef9cd6d5d3c682e4221c0860c56eec60906409f87969d037d54746,2025-06-30T14:44:36.367000 +CVE-2024-56916,0,1,ddec84feb060c6692542ce83bc1c5b4da97e63b51594ac6bf185c6506a237a90,2025-06-30T14:43:46.500000 +CVE-2024-56917,0,1,d3911a29079427aae62ba3f01a645b560a6cabe6fcae02fb5cf21a74b03b8a9c,2025-06-30T14:44:01.510000 +CVE-2024-56918,0,1,23c15c540db67d9e62e74b60c2465b2a975ba46a4be607d90a04919eb2501c8b,2025-06-30T14:42:40.747000 CVE-2024-5692,0,0,7a0e93b4132c5556301f236baef387bd61eb187dcc76da3b0d3022ff1bfb1690,2025-03-27T20:07:17.167000 CVE-2024-56921,0,0,65e4ee21eb8e6911078997661eaf48bf52901c948266f74aa9bcc9e4df1037c6,2025-04-22T14:58:46.420000 CVE-2024-56923,0,0,604a6006dae0a3ab9d362a51dab025175b10dba2548343a30a9a7501ead66a17,2025-05-28T20:41:45.083000 @@ -284112,7 +284114,7 @@ CVE-2025-1627,0,0,99c85fafaaf67f555bc8893d0604893a5e6a8eb97fbb3c533f270827571aea CVE-2025-1628,0,0,0981be15b6355fe96e6cf6533415aadaefca54b32ab4ef2345058038a2f7e6bb,2025-03-19T23:15:12.783000 CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0c3,2025-02-24T05:15:11.280000 CVE-2025-1632,0,0,73963594ec349af4ff5563baefa2275473270d101d132ae7dd238c3c85b0ecda,2025-03-25T15:41:41.683000 -CVE-2025-1634,0,1,6a8fc3c51127acf913296bfd500d79df66071ea441414746c7b9e30b3cdede8d,2025-06-30T14:15:23.023000 +CVE-2025-1634,0,0,6a8fc3c51127acf913296bfd500d79df66071ea441414746c7b9e30b3cdede8d,2025-06-30T14:15:23.023000 CVE-2025-1635,0,0,0499f172f9ad04082d92344ffc1551c65c1ba825d69539bd091607b7115ee757,2025-03-28T16:20:27.283000 CVE-2025-1636,0,0,76209b53ada620ac1db5782040876be75fe1cf6931e7839f2c9a9e46ee35bb38,2025-03-28T16:20:21.163000 CVE-2025-1638,0,0,627220f87bb0a3619d145b1fa74713ce7dfbc18460f28421739180b159028d87,2025-03-01T08:15:34.167000 @@ -287854,9 +287856,9 @@ CVE-2025-24286,0,0,034f4735b759c015af5127b9d89110614ed8c3049acfff1bc50c8bca6cd7a CVE-2025-24287,0,0,e4c9267ee4e2b809f604587bc5eee6cd21e2e71c2e8466a037bfa9610f808d26,2025-06-23T20:16:59.783000 CVE-2025-24288,0,0,8c53ac1108832d48dced15925414d69bc16e0b8a3d66fa9e2b712aa001a0f223,2025-06-23T20:16:59.783000 CVE-2025-24289,0,0,7a9d75f0942936f1135be131979bfd172806164db7cf1822ac832af863c7f8b9,2025-06-29T20:15:24.787000 -CVE-2025-24290,0,0,88b6a2977309d56cc1b02c27aaeab5f8bd770adfe3712af6ae24277dec4930c5,2025-06-29T20:15:24.930000 +CVE-2025-24290,0,1,bf6c3c61aa6df018e30b8a98c96a46d31c1d96b3b505d27905c5e77ce9602b00,2025-06-30T15:15:23.027000 CVE-2025-24291,0,0,d4490b4985dc9d06931a7bcb82a7ddf2b131bc34df9f31211f4bbc696cfeaab8,2025-06-23T20:16:59.783000 -CVE-2025-24292,0,1,7194e00133a0e9d2ad7b055e7c2fa8448de7e10a99772d74caaa371a3c5cb923,2025-06-30T14:15:23.483000 +CVE-2025-24292,0,0,7194e00133a0e9d2ad7b055e7c2fa8448de7e10a99772d74caaa371a3c5cb923,2025-06-30T14:15:23.483000 CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000 CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000 CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000 @@ -290628,6 +290630,7 @@ CVE-2025-28945,0,0,9f465a176543fd155026fb6120e51b48e6dd14d6da31887b407335eb5292f CVE-2025-28946,0,0,7886de75db013f5ad0071e06e43615f0345b600df2c97716e8030ef52c835b88,2025-06-27T12:15:31.950000 CVE-2025-28947,0,0,f214098fdabb579993c13bf7b73485ca0269a2d95d30b6a4d629d9a88d98eaac,2025-06-27T12:15:32.120000 CVE-2025-28948,0,0,4d297b75c70e34b4f1f934c39f9e9a15f431eb4dd554bce73695cd2e9278acd1,2025-06-06T14:06:58.193000 +CVE-2025-2895,1,1,5d1006d1b004922ab0a0aea0e99595c730a0463456420ebc4f399df63c1756e6,2025-06-30T15:15:23.133000 CVE-2025-28950,0,0,95165f9c1a939415b93ab4b82b6c9d0ac3c413eca61b0efe3dd2ef6e35397ed6,2025-06-06T14:06:58.193000 CVE-2025-28952,0,0,36a2d7e90e0ea02d7a032d500231cfdd2aabec1fc4b51f58a9dcb0a5dc7dfaf2,2025-06-06T14:06:58.193000 CVE-2025-28954,0,0,5e1648f3e4f3b4c2a3d29f98809dccb3c28ca26ee065ae7467a201e3a5a261fd,2025-06-06T14:06:58.193000 @@ -293539,7 +293542,7 @@ CVE-2025-32889,0,0,1758151af4b145b593cac5bce0174518afb9f62175456015713f13270f9e4 CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000 CVE-2025-32890,0,0,f2c41c451f0f9806b1ea692a8d179705ea340cd405232ede792930108ac7f581,2025-06-20T16:28:33.357000 CVE-2025-32896,0,0,dbfbc7924e8ba4745e61a6194439a531988d3ba9592f604f77799bc3cdf2b49d,2025-06-23T20:16:59.783000 -CVE-2025-32897,0,0,2cfeadc3208e6055a7882b0e72566da490f7f14c2bfaa9166965d9bbaf9015b6,2025-06-28T19:15:21.917000 +CVE-2025-32897,0,1,d396378719ac3ac970d9264626b7c604e05c07c6c6283e08f1e1e8dfac24da97,2025-06-30T15:15:23.310000 CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000 CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000 CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000 @@ -295953,7 +295956,7 @@ CVE-2025-45514,0,0,a0097e631e2f67ebed1594ab343f4868011705c17a9a818d4cf23fb2040b0 CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca4a,2025-05-12T17:32:32.760000 CVE-2025-45525,0,0,d964bbfa3565b6e3c8c91f8b1ef6cff3eca96639573f7a1a53ee29de90662ea9,2025-06-20T12:15:21.780000 CVE-2025-45526,0,0,7c332e0ac82e00dd31b05e654cf89202b648251ee9903ffd3830e5fdc6c807ef,2025-06-26T16:15:29.013000 -CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000 +CVE-2025-45529,0,1,4f83eef46b688bf0e4ec3077ffad2f4980e2128a406603b5b7faf0e79f936e42,2025-06-30T15:24:44.787000 CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000 CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000 CVE-2025-45542,0,0,8d78c8ce54cce28d25176b8f60395b493e3616afc4cda36b64936d5e7d008d28,2025-06-13T17:45:40.463000 @@ -296065,7 +296068,7 @@ CVE-2025-45997,0,0,6427fb401720f5a1ec9f9ddb9a7287b863d0733096e213df5c6d6f0eb039c CVE-2025-4600,0,0,026383a000ee9b132f9dd97af63a0401be9be3b21241dcdc822424d27f013326,2025-05-16T14:42:18.700000 CVE-2025-4601,0,0,420ee2c846cf84b8070c3dfb7dddc6fbabb1090be5e1b7c4bf957aa0ce301eee,2025-06-12T16:06:39.330000 CVE-2025-46011,0,0,c1776a78cb3800147b82714f56c78717ef81a5a9688b212486314b16953839ea,2025-06-09T21:15:46.517000 -CVE-2025-46014,0,0,339242950fa7f5cbde721d1e7f6f5bde04e6158e20cedf68b467b26893584939,2025-06-30T02:15:21.077000 +CVE-2025-46014,0,1,9ca42e5fe9fec2ed5f922ded1c49b4824297e6807cabc2a04a6688ce82f30932,2025-06-30T15:15:23.493000 CVE-2025-4602,0,0,409776dd4d3f5aa956641458acdab541ced8aee4cc4b0cac3a447338c59994d1,2025-05-28T14:58:52.920000 CVE-2025-4603,0,0,353abd9188b7471dff5b9b62f88597abbd29f78728037be18e8dafefcd5f4d4e,2025-05-28T14:58:52.920000 CVE-2025-46035,0,0,9f1a3c83a5b792a1c1c188b51250b415f15a289195e306748247efc3597a83c4,2025-06-17T20:32:44.497000 @@ -298799,8 +298802,8 @@ CVE-2025-53385,0,0,6919cbbce415f6a7965892da59e02c2851818e452a8966594003b8317f980 CVE-2025-53386,0,0,421cd769cbad85964ce345c4647b4d8effb0b5cc08970d5238cc9cb8e91646c3,2025-06-28T03:15:25.790000 CVE-2025-53387,0,0,e2764bb76f8a0fc53098c27eec0c194d10d953d856450579213a555deedd9d56,2025-06-28T03:15:25.860000 CVE-2025-53388,0,0,a892e721c397f4ad48b104d8840965c60b9650055c4b0c4a9cdb65c7fe578d48,2025-06-28T03:15:25.933000 -CVE-2025-53391,0,1,d6a5feadc654770d5eb9044015abe2f0ab8ad12452f05fd29f2c667bb1c299c5,2025-06-30T14:15:24.623000 -CVE-2025-53392,0,1,09bcec02e68f7eebeb3ae0f5617e33ea1a55ca6419f82398526d0eb474d72d82,2025-06-30T14:15:24.803000 +CVE-2025-53391,0,0,d6a5feadc654770d5eb9044015abe2f0ab8ad12452f05fd29f2c667bb1c299c5,2025-06-30T14:15:24.623000 +CVE-2025-53392,0,0,09bcec02e68f7eebeb3ae0f5617e33ea1a55ca6419f82398526d0eb474d72d82,2025-06-30T14:15:24.803000 CVE-2025-53393,0,0,fb13ac251ec592ad13d4a1e4669c330156dada86640bb9801a39334f38a5732a,2025-06-28T23:15:21.760000 CVE-2025-5340,0,0,9b48da383be5dfbe2bc488480a2be183877451ec75241964210e2e3aad9a2ceb,2025-06-04T14:54:33.783000 CVE-2025-5341,0,0,2f7555dddd47395f556aef803e272926d99b2be1a7b798f5f5a29577ec1f1191,2025-06-05T20:12:23.777000 @@ -299879,6 +299882,8 @@ CVE-2025-6904,0,0,88be67b36fa096e5a28a99ea4de5a92822a51722117346b92a5bab5430f674 CVE-2025-6905,0,0,556c859ce2d577ad25e48170fe47285a6dc4730fa00d12649c467e72cd498810,2025-06-30T12:15:22.990000 CVE-2025-6906,0,0,cf3e61eb00cd7ce30fdabe692fd71d91aa1ee1b5be1319f6d64ea8501917cc16,2025-06-30T13:15:31.340000 CVE-2025-6907,0,0,4e2e01e9474347117178ce8b5bec3ea2173e0c6ed9ac1f547c616834a1ddaa35,2025-06-30T13:15:31.700000 -CVE-2025-6908,0,0,54c99b931e0e2e05ae4b06debe3962b87c4e15f3e24354367dc0f2e66095600b,2025-06-30T13:15:32.133000 -CVE-2025-6909,1,1,49330b47ce9f897f194af2ff0920059ad741b10f674236ce7856b388f0fedd82,2025-06-30T14:15:25.083000 -CVE-2025-6910,1,1,a5539e4f4f0c5706c78dc2eafdf1b30d64932d84c37773d07a236f34a566ab68,2025-06-30T14:15:25.343000 +CVE-2025-6908,0,1,d9e5df3855efea41eb440563e08be77d14554a4b7180832b9e9d71a4df3f94ae,2025-06-30T15:15:23.970000 +CVE-2025-6909,0,0,49330b47ce9f897f194af2ff0920059ad741b10f674236ce7856b388f0fedd82,2025-06-30T14:15:25.083000 +CVE-2025-6910,0,0,a5539e4f4f0c5706c78dc2eafdf1b30d64932d84c37773d07a236f34a566ab68,2025-06-30T14:15:25.343000 +CVE-2025-6911,1,1,d0fafa9a66e085c498b54e4920ef02da4a52979da2579142bcf7efffb454e6c4,2025-06-30T15:15:24.310000 +CVE-2025-6912,1,1,0537494aecc4d429c019d76d780b3557d9e85087e7002cf9ff20039149e2ad2c,2025-06-30T15:15:24.510000