Search criteria
84 vulnerabilities found for pix_firewall_software by cisco
FKIE_CVE-2016-6366
Vulnerability from fkie_nvd - Published: 2016-08-18 18:59 - Updated: 2025-10-22 00:15
Severity ?
Summary
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
References
Impacted products
{
"cisaActionDue": "2022-06-14",
"cisaExploitAdd": "2022-05-24",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Cisco Adaptive Security Appliance (ASA) SNMP Buffer Overflow Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9178BC88-B81B-4F0C-879D-31D9C204F7E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_501:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93103865-C140-4C93-9A7F-6EEF25958736",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_506:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32283245-33A1-41E2-B8CD-CFC2459F840B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_506e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "107A6891-05FF-4812-B113-96247EDE136F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A35FF15C-5E02-4AD1-A4E6-E40E93A9F8F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "008185AD-BF4E-49ED-B3A8-FDA7F82D94E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D1DB6E-2C3C-4844-A76E-D679735BC150",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_525:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7181264-0852-4637-A9C0-86CD3BB978AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_535:-:*:*:*:*:*:*:*",
"matchCriteriaId": "488BE38C-6F9C-4652-92A5-F3626DBEE093",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F95FC8FC-52B2-4A7D-A0CB-2DDB2BE48F8B",
"versionEndExcluding": "9.0.4.40",
"versionStartIncluding": "7.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7DE2BB-3ABB-49FB-8798-37A356839C6B",
"versionEndExcluding": "9.1.7\\(9\\)",
"versionStartIncluding": "9.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DB701E10-57D0-4C9A-8FB7-5A27A4C9D9F0",
"versionEndExcluding": "9.2.4\\(14\\)",
"versionStartIncluding": "9.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "186B85FF-97E6-45C2-ABD0-DBB9C6981EEA",
"versionEndExcluding": "9.3.3\\(10\\)",
"versionStartIncluding": "9.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59EB3383-005B-443E-A65A-798497D3E750",
"versionEndExcluding": "9.4.3\\(8\\)",
"versionStartIncluding": "9.4.0.115",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1C69FA5A-EC00-4BAF-8EA4-AEE473DD299B",
"versionEndIncluding": "9.5\\(3\\)",
"versionStartIncluding": "9.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88B1C470-34BE-4D69-9DF1-0C30866B9498",
"versionEndExcluding": "9.6.1\\(11\\)",
"versionStartIncluding": "9.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:7604:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65973B50-2AA1-4B83-925A-8DB2D4720ADB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:7606-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25DD80A8-F664-4C30-A89F-C2299CCACB7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:7609-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385DBA44-E84B-4752-8E8E-170EF13784D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:7613-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1E30F72-0218-496D-BFAD-CED0AAC5E58E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7018906A-ACDF-4D7B-B816-ED9C235BF04E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E10D97EB-51C4-4904-ABBA-5FCDC9B6D062",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500_csc-ssm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD44DFA7-9D3E-4158-9551-A698344F9022",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6A8BB7-2000-4CA2-9DD7-89573CE4C73A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "763B801D-CA1E-4C56-8B06-3373EA307C7E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30AC6907-3091-409F-967D-64A82A0C5A8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92AE506A-E710-465B-B795-470FDE0E0ECA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B091B9BA-D4CA-435B-8D66-602B45F0E0BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5512-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08F0F160-DAD2-48D4-B7B2-4818B2526F35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5515-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "977D597B-F6DE-4438-AB02-06BE64D71EBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B387F62-6341-434D-903F-9B72E7F84ECB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB71EB29-0115-4307-A9F7-262394FD9FB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17C5A524-E1D9-480F-B655-0680AA5BF720",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57179F60-E330-4FF0-9664-B1E4637FF210",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6287D95-F564-44B7-A0F9-91396D7C2C4E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5535C936-391B-4619-AA03-B35265FC15D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E828B8-5ECC-4A09-B2AD-DEDC558713DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asa_5585-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16AE20C2-C77E-4E04-BF13-A48696E52426",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEFBFA86-64F2-4CB0-99E1-FAEFCA690FF8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6500-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15B48565-92C7-4AE1-AE3A-6FF7DD010745",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6503-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F202892E-2E58-4D77-B983-38AFA51CDBC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6504-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F57DF3E-4069-4EF0-917E-84CDDFCEBEEF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6506-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE25114-ABBC-47A0-9C20-E8D40D721313",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6509-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FADD5F49-2817-40EC-861C-C922825708BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6509-neb-a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E628F9C4-98C6-4A95-AF81-F1E6A56E8648",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6509-v-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AFF899C-1EB3-46D8-9003-EA36A68C90B3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6513:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6463491-F63E-44CB-A1D4-C029BE7D3D3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_6513-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8668D34-096B-4FC3-B9B1-0ECFD6265778",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:asa_1000v_cloud_firewall_software:8.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D04D15E5-EB98-4A87-AAD5-BC7E553E4EA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:asa_1000v_cloud_firewall_software:8.7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "84BBCF6D-5529-4D7F-A32D-4C1C03139819",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en Cisco Adaptive Security Applicance (ASA) Software hasta la versi\u00f3n 9.4.2.3 en dispositivos ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX y FWSM permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes IPv4 SNMP manipulados, tambi\u00e9n conocido como Bug ID CSCva92151 o EXTRABACON."
}
],
"id": "CVE-2016-6366",
"lastModified": "2025-10-22T00:15:54.613",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-08-18T18:59:00.117",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Exploit",
"Press/Media Coverage",
"Vendor Advisory"
],
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Not Applicable",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92521"
},
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036637"
},
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"source": "psirt@cisco.com",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Press/Media Coverage",
"Vendor Advisory"
],
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Not Applicable",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/92521"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1036637"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Exploit"
],
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6366"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-0149
Vulnerability from fkie_nvd - Published: 2013-08-05 13:22 - Updated: 2025-04-11 00:51
Severity ?
Summary
The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.0 | |
| cisco | ios | 12.0\(1\) | |
| cisco | ios | 12.0\(1\)s | |
| cisco | ios | 12.0\(1\)st | |
| cisco | ios | 12.0\(1\)w | |
| cisco | ios | 12.0\(1\)xa3 | |
| cisco | ios | 12.0\(1\)xb | |
| cisco | ios | 12.0\(1\)xe | |
| cisco | ios | 12.0\(2\) | |
| cisco | ios | 12.0\(2\)xc | |
| cisco | ios | 12.0\(2\)xd | |
| cisco | ios | 12.0\(2\)xe | |
| cisco | ios | 12.0\(2\)xf | |
| cisco | ios | 12.0\(2\)xg | |
| cisco | ios | 12.0\(2a\) | |
| cisco | ios | 12.0\(2b\) | |
| cisco | ios | 12.0\(3\) | |
| cisco | ios | 12.0\(3\)t2 | |
| cisco | ios | 12.0\(3\)xe | |
| cisco | ios | 12.0\(3.2\) | |
| cisco | ios | 12.0\(3.3\)s | |
| cisco | ios | 12.0\(3.4\)t | |
| cisco | ios | 12.0\(3.6\)w5\(9.0.5\) | |
| cisco | ios | 12.0\(3d\) | |
| cisco | ios | 12.0\(4\) | |
| cisco | ios | 12.0\(4\)s | |
| cisco | ios | 12.0\(4\)t | |
| cisco | ios | 12.0\(4\)xe | |
| cisco | ios | 12.0\(4\)xe1 | |
| cisco | ios | 12.0\(4\)xm | |
| cisco | ios | 12.0\(4\)xm1 | |
| cisco | ios | 12.0\(5\) | |
| cisco | ios | 12.0\(5\)s | |
| cisco | ios | 12.0\(5\)t | |
| cisco | ios | 12.0\(5\)t1 | |
| cisco | ios | 12.0\(5\)t2 | |
| cisco | ios | 12.0\(5\)wc | |
| cisco | ios | 12.0\(5\)wc2 | |
| cisco | ios | 12.0\(5\)wc2b | |
| cisco | ios | 12.0\(5\)wc3 | |
| cisco | ios | 12.0\(5\)wc3b | |
| cisco | ios | 12.0\(5\)wc5a | |
| cisco | ios | 12.0\(05\)wc8 | |
| cisco | ios | 12.0\(5\)wc9 | |
| cisco | ios | 12.0\(5\)wc9a | |
| cisco | ios | 12.0\(5\)wc11 | |
| cisco | ios | 12.0\(5\)wc13 | |
| cisco | ios | 12.0\(5\)wx | |
| cisco | ios | 12.0\(5\)xe | |
| cisco | ios | 12.0\(5\)xk | |
| cisco | ios | 12.0\(5\)xk2 | |
| cisco | ios | 12.0\(5\)xn | |
| cisco | ios | 12.0\(5\)xn1 | |
| cisco | ios | 12.0\(5\)xs | |
| cisco | ios | 12.0\(5\)xu | |
| cisco | ios | 12.0\(5\)yb4 | |
| cisco | ios | 12.0\(5.1\)xp | |
| cisco | ios | 12.0\(5.2\)xu | |
| cisco | ios | 12.0\(5.3\)wc1 | |
| cisco | ios | 12.0\(5.4\)wc1 | |
| cisco | ios | 12.0\(5a\)e | |
| cisco | ios | 12.0\(6\) | |
| cisco | ios | 12.0\(6b\) | |
| cisco | ios | 12.0\(7\)db2 | |
| cisco | ios | 12.0\(7\)dc1 | |
| cisco | ios | 12.0\(7\)s1 | |
| cisco | ios | 12.0\(7\)sc | |
| cisco | ios | 12.0\(7\)t | |
| cisco | ios | 12.0\(7\)t2 | |
| cisco | ios | 12.0\(7\)t3 | |
| cisco | ios | 12.0\(7\)wx5\(15a\) | |
| cisco | ios | 12.0\(7\)xe | |
| cisco | ios | 12.0\(7\)xe2 | |
| cisco | ios | 12.0\(7\)xf | |
| cisco | ios | 12.0\(7\)xf1 | |
| cisco | ios | 12.0\(7\)xk | |
| cisco | ios | 12.0\(7\)xk2 | |
| cisco | ios | 12.0\(7\)xk3 | |
| cisco | ios | 12.0\(7\)xv | |
| cisco | ios | 12.0\(7.4\)s | |
| cisco | ios | 12.0\(7a\) | |
| cisco | ios | 12.0\(8\) | |
| cisco | ios | 12.0\(8\)s1 | |
| cisco | ios | 12.0\(8.0.2\)s | |
| cisco | ios | 12.0\(8.3\)sc | |
| cisco | ios | 12.0\(8a\) | |
| cisco | ios | 12.0\(9\) | |
| cisco | ios | 12.0\(9\)s | |
| cisco | ios | 12.0\(9\)s8 | |
| cisco | ios | 12.0\(9a\) | |
| cisco | ios | 12.0\(10\) | |
| cisco | ios | 12.0\(10\)s3b | |
| cisco | ios | 12.0\(10\)s7 | |
| cisco | ios | 12.0\(10\)s8 | |
| cisco | ios | 12.0\(10\)w5 | |
| cisco | ios | 12.0\(10\)w5\(18f\) | |
| cisco | ios | 12.0\(10\)w5\(18g\) | |
| cisco | ios | 12.0\(10a\) | |
| cisco | ios | 12.0\(11\)s6 | |
| cisco | ios | 12.0\(11\)st4 | |
| cisco | ios | 12.0\(11a\) | |
| cisco | ios | 12.0\(12\) | |
| cisco | ios | 12.0\(12\)s3 | |
| cisco | ios | 12.0\(12\)s4 | |
| cisco | ios | 12.0\(12a\) | |
| cisco | ios | 12.0\(13\)s6 | |
| cisco | ios | 12.0\(13\)s8 | |
| cisco | ios | 12.0\(13\)w5\(19c\) | |
| cisco | ios | 12.0\(13\)wt6\(1\) | |
| cisco | ios | 12.0\(13a\) | |
| cisco | ios | 12.0\(14\) | |
| cisco | ios | 12.0\(14\)s7 | |
| cisco | ios | 12.0\(14\)s8 | |
| cisco | ios | 12.0\(14\)st | |
| cisco | ios | 12.0\(14\)st3 | |
| cisco | ios | 12.0\(14\)w5\(20\) | |
| cisco | ios | 12.0\(14a\) | |
| cisco | ios | 12.0\(15\)s | |
| cisco | ios | 12.0\(15\)s3 | |
| cisco | ios | 12.0\(15\)s6 | |
| cisco | ios | 12.0\(15\)s7 | |
| cisco | ios | 12.0\(15\)sc | |
| cisco | ios | 12.0\(15\)sl | |
| cisco | ios | 12.0\(15a\) | |
| cisco | ios | 12.0\(16\)s | |
| cisco | ios | 12.0\(16\)s8 | |
| cisco | ios | 12.0\(16\)s8a | |
| cisco | ios | 12.0\(16\)s10 | |
| cisco | ios | 12.0\(16\)sc | |
| cisco | ios | 12.0\(16\)sc3 | |
| cisco | ios | 12.0\(16\)st | |
| cisco | ios | 12.0\(16\)st1 | |
| cisco | ios | 12.0\(16\)w5\(21\) | |
| cisco | ios | 12.0\(16.06\)s | |
| cisco | ios | 12.0\(16a\) | |
| cisco | ios | 12.0\(17\) | |
| cisco | ios | 12.0\(17\)s | |
| cisco | ios | 12.0\(17\)s4 | |
| cisco | ios | 12.0\(17\)s7 | |
| cisco | ios | 12.0\(17\)sl | |
| cisco | ios | 12.0\(17\)sl2 | |
| cisco | ios | 12.0\(17\)sl6 | |
| cisco | ios | 12.0\(17\)sl9 | |
| cisco | ios | 12.0\(17\)st1 | |
| cisco | ios | 12.0\(17\)st5 | |
| cisco | ios | 12.0\(17\)st8 | |
| cisco | ios | 12.0\(17a\) | |
| cisco | ios | 12.0\(18\)s | |
| cisco | ios | 12.0\(18\)s5 | |
| cisco | ios | 12.0\(18\)s5a | |
| cisco | ios | 12.0\(18\)s7 | |
| cisco | ios | 12.0\(18\)sl | |
| cisco | ios | 12.0\(18\)st1 | |
| cisco | ios | 12.0\(18\)w5\(22b\) | |
| cisco | ios | 12.0\(18b\) | |
| cisco | ios | 12.0\(19\) | |
| cisco | ios | 12.0\(19\)s | |
| cisco | ios | 12.0\(19\)s2 | |
| cisco | ios | 12.0\(19\)s2a | |
| cisco | ios | 12.0\(19\)s4 | |
| cisco | ios | 12.0\(19\)sl | |
| cisco | ios | 12.0\(19\)sl4 | |
| cisco | ios | 12.0\(19\)sp | |
| cisco | ios | 12.0\(19\)st | |
| cisco | ios | 12.0\(19\)st2 | |
| cisco | ios | 12.0\(19\)st6 | |
| cisco | ios | 12.0\(19a\) | |
| cisco | ios | 12.0\(20\)sl | |
| cisco | ios | 12.0\(20\)sp | |
| cisco | ios | 12.0\(20\)sp1 | |
| cisco | ios | 12.0\(20\)st2 | |
| cisco | ios | 12.0\(20\)st6 | |
| cisco | ios | 12.0\(20\)st7 | |
| cisco | ios | 12.0\(20\)sx | |
| cisco | ios | 12.0\(20\)w5\(22b\) | |
| cisco | ios | 12.0\(20.4\)sp | |
| cisco | ios | 12.0\(20a\) | |
| cisco | ios | 12.0\(21\)s | |
| cisco | ios | 12.0\(21\)s1 | |
| cisco | ios | 12.0\(21\)s3 | |
| cisco | ios | 12.0\(21\)s4a | |
| cisco | ios | 12.0\(21\)s5a | |
| cisco | ios | 12.0\(21\)s6 | |
| cisco | ios | 12.0\(21\)s7 | |
| cisco | ios | 12.0\(21\)sl | |
| cisco | ios | 12.0\(21\)st | |
| cisco | ios | 12.0\(21\)st6 | |
| cisco | ios | 12.0\(21\)st7 | |
| cisco | ios | 12.0\(21\)sx | |
| cisco | ios | 12.0\(21a\) | |
| cisco | ios | 12.0\(22\)s | |
| cisco | ios | 12.0\(22\)s4 | |
| cisco | ios | 12.0\(22\)s5 | |
| cisco | ios | 12.0\(22\)sy | |
| cisco | ios | 12.0\(23\)s2 | |
| cisco | ios | 12.0\(23\)s3 | |
| cisco | ios | 12.0\(23\)s4 | |
| cisco | ios | 12.0\(23\)s5 | |
| cisco | ios | 12.0\(23\)s6 | |
| cisco | ios | 12.0\(23\)sx | |
| cisco | ios | 12.0\(23\)sz | |
| cisco | ios | 12.0\(24\)s1 | |
| cisco | ios | 12.0\(24\)s2 | |
| cisco | ios | 12.0\(24\)s4 | |
| cisco | ios | 12.0\(24\)s5 | |
| cisco | ios | 12.0\(24\)s6 | |
| cisco | ios | 12.0\(24.2\)s | |
| cisco | ios | 12.0\(25\)s1 | |
| cisco | ios | 12.0\(25\)w5\(27\) | |
| cisco | ios | 12.0\(25\)w5\(27c\) | |
| cisco | ios | 12.0\(25\)w5-27d | |
| cisco | ios | 12.0\(25.4\)s1 | |
| cisco | ios | 12.0\(26\) | |
| cisco | ios | 12.0\(26\)s | |
| cisco | ios | 12.0\(26\)s1 | |
| cisco | ios | 12.0\(26\)s2 | |
| cisco | ios | 12.0\(26\)s6 | |
| cisco | ios | 12.0\(26\)w5\(28\) | |
| cisco | ios | 12.0\(26\)w5\(28a\) | |
| cisco | ios | 12.0\(27\) | |
| cisco | ios | 12.0\(27\)s | |
| cisco | ios | 12.0\(27\)s1 | |
| cisco | ios | 12.0\(27\)sv | |
| cisco | ios | 12.0\(27\)sv1 | |
| cisco | ios | 12.0\(27\)sv2 | |
| cisco | ios | 12.0\(28\) | |
| cisco | ios | 12.0\(28\)s3 | |
| cisco | ios | 12.0\(28\)s5 | |
| cisco | ios | 12.0\(28\)w5\(31a\) | |
| cisco | ios | 12.0\(28\)w5-30b | |
| cisco | ios | 12.0\(28\)w5-32a | |
| cisco | ios | 12.0\(28c\) | |
| cisco | ios | 12.0\(28d\) | |
| cisco | ios | 12.0\(30\)s1 | |
| cisco | ios | 12.0\(30\)s2 | |
| cisco | ios | 12.0\(30\)s4 | |
| cisco | ios | 12.0\(31\)s | |
| cisco | ios | 12.0\(31\)s1 | |
| cisco | ios | 12.0\(32\)s12 | |
| cisco | ios | 12.0\(32\)s13 | |
| cisco | ios | 12.0\(32\)sy8 | |
| cisco | ios | 12.0\(32\)sy9 | |
| cisco | ios | 12.0\(33\)s3 | |
| cisco | ios | 12.0\(33\)s4 | |
| cisco | ios | 12.0da | |
| cisco | ios | 12.0db | |
| cisco | ios | 12.0dc | |
| cisco | ios | 12.0ev | |
| cisco | ios | 12.0s | |
| cisco | ios | 12.0sc | |
| cisco | ios | 12.0sl | |
| cisco | ios | 12.0sp | |
| cisco | ios | 12.0st | |
| cisco | ios | 12.0sv | |
| cisco | ios | 12.0sx | |
| cisco | ios | 12.0sy | |
| cisco | ios | 12.0sz | |
| cisco | ios | 12.0t | |
| cisco | ios | 12.0w | |
| cisco | ios | 12.0w5 | |
| cisco | ios | 12.0wc | |
| cisco | ios | 12.0wt | |
| cisco | ios | 12.0wx | |
| cisco | ios | 12.0xa | |
| cisco | ios | 12.0xb | |
| cisco | ios | 12.0xc | |
| cisco | ios | 12.0xd | |
| cisco | ios | 12.0xe | |
| cisco | ios | 12.0xf | |
| cisco | ios | 12.0xg | |
| cisco | ios | 12.0xh | |
| cisco | ios | 12.0xi | |
| cisco | ios | 12.0xj | |
| cisco | ios | 12.0xk | |
| cisco | ios | 12.0xl | |
| cisco | ios | 12.0xm | |
| cisco | ios | 12.0xn | |
| cisco | ios | 12.0xp | |
| cisco | ios | 12.0xq | |
| cisco | ios | 12.0xr | |
| cisco | ios | 12.0xs | |
| cisco | ios | 12.0xt | |
| cisco | ios | 12.0xu | |
| cisco | ios | 12.0xv | |
| cisco | ios | 12.0xw | |
| cisco | ios | 12.1 | |
| cisco | ios | 12.1\(1\) | |
| cisco | ios | 12.1\(1\)db | |
| cisco | ios | 12.1\(1\)db2 | |
| cisco | ios | 12.1\(1\)dc | |
| cisco | ios | 12.1\(1\)dc2 | |
| cisco | ios | 12.1\(1\)e5 | |
| cisco | ios | 12.1\(1\)ex | |
| cisco | ios | 12.1\(1\)t | |
| cisco | ios | 12.1\(1.3\)t | |
| cisco | ios | 12.1\(1a\)t1 | |
| cisco | ios | 12.1\(1c\) | |
| cisco | ios | 12.1\(2\)e1 | |
| cisco | ios | 12.1\(2\)t | |
| cisco | ios | 12.1\(2\)xf | |
| cisco | ios | 12.1\(2\)xf4 | |
| cisco | ios | 12.1\(2\)xf5 | |
| cisco | ios | 12.1\(6\)ea2c | |
| cisco | ios | 12.1\(6\)ey | |
| cisco | ios | 12.1\(6\)ez1 | |
| cisco | ios | 12.1\(6\)ez2 | |
| cisco | ios | 12.1\(6.5\) | |
| cisco | ios | 12.1\(6.5\)ec3 | |
| cisco | ios | 12.1\(6a\) | |
| cisco | ios | 12.1\(7\) | |
| cisco | ios | 12.1\(7\)cx | |
| cisco | ios | 12.1\(7\)da2 | |
| cisco | ios | 12.1\(7\)da3 | |
| cisco | ios | 12.1\(7\)ec | |
| cisco | ios | 12.1\(7a\)e6 | |
| cisco | ios | 12.1\(7a\)ey | |
| cisco | ios | 12.1\(7a\)ey3 | |
| cisco | ios | 12.1\(7b\) | |
| cisco | ios | 12.1\(8\) | |
| cisco | ios | 12.1\(8\)aa1 | |
| cisco | ios | 12.1\(8\)e | |
| cisco | ios | 12.1\(8\)ea | |
| cisco | ios | 12.1\(8\)ea1b | |
| cisco | ios | 12.1\(8\)ea2b | |
| cisco | ios | 12.1\(8a\)e | |
| cisco | ios | 12.1\(8a\)ew | |
| cisco | ios | 12.1\(8a\)ew1 | |
| cisco | ios | 12.1\(8a\)ex | |
| cisco | ios | 12.1\(8b\)e8 | |
| cisco | ios | 12.1\(8b\)e9 | |
| cisco | ios | 12.1\(8b\)e14 | |
| cisco | ios | 12.1\(8b\)e15 | |
| cisco | ios | 12.1\(8b\)e16 | |
| cisco | ios | 12.1\(8b\)e18 | |
| cisco | ios | 12.1\(8b\)e20 | |
| cisco | ios | 12.1\(8b\)ex4 | |
| cisco | ios | 12.1\(8c\) | |
| cisco | ios | 12.1\(9\) | |
| cisco | ios | 12.1\(9\)aa | |
| cisco | ios | 12.1\(9\)e | |
| cisco | ios | 12.1\(9\)e3 | |
| cisco | ios | 12.1\(9\)ea | |
| cisco | ios | 12.1\(9\)ex | |
| cisco | ios | 12.1\(9\)ex3 | |
| cisco | ios | 12.1\(9a\) | |
| cisco | ios | 12.1\(10\) | |
| cisco | ios | 12.1\(10\)aa | |
| cisco | ios | 12.1\(10\)e | |
| cisco | ios | 12.1\(10\)e4 | |
| cisco | ios | 12.1\(10\)ec | |
| cisco | ios | 12.1\(10\)ec1 | |
| cisco | ios | 12.1\(10\)ex | |
| cisco | ios | 12.1\(10\)ey | |
| cisco | ios | 12.1\(10.5\)ec | |
| cisco | ios | 12.1\(10a\) | |
| cisco | ios | 12.1\(11\) | |
| cisco | ios | 12.1\(11\)e | |
| cisco | ios | 12.1\(11\)ea1 | |
| cisco | ios | 12.1\(11\)ec | |
| cisco | ios | 12.1\(11.5\)e | |
| cisco | ios | 12.1\(11a\) | |
| cisco | ios | 12.1\(11b\) | |
| cisco | ios | 12.1\(11b\)e | |
| cisco | ios | 12.1\(11b\)e12 | |
| cisco | ios | 12.1\(11b\)e14 | |
| cisco | ios | 12.1\(12\) | |
| cisco | ios | 12.1\(12\)e | |
| cisco | ios | 12.1\(12a\) | |
| cisco | ios | 12.1\(12b\) | |
| cisco | ios | 12.1\(12c\) | |
| cisco | ios | 12.1\(12c\)e7 | |
| cisco | ios | 12.1\(12c\)ec | |
| cisco | ios | 12.1\(12c\)ev01 | |
| cisco | ios | 12.1\(12c\)ew4 | |
| cisco | ios | 12.1\(13\) | |
| cisco | ios | 12.1\(13\)ay | |
| cisco | ios | 12.1\(13\)e1 | |
| cisco | ios | 12.1\(13\)e3 | |
| cisco | ios | 12.1\(13\)e7 | |
| cisco | ios | 12.1\(13\)e9 | |
| cisco | ios | 12.1\(13\)e12 | |
| cisco | ios | 12.1\(13\)e13 | |
| cisco | ios | 12.1\(13\)e17 | |
| cisco | ios | 12.1\(13\)ea1 | |
| cisco | ios | 12.1\(13\)ea1c | |
| cisco | ios | 12.1\(13\)ew | |
| cisco | ios | 12.1\(13\)ew4 | |
| cisco | ios | 12.1\(13\)ex2 | |
| cisco | ios | 12.1\(13.4\)e | |
| cisco | ios | 12.1\(14\) | |
| cisco | ios | 12.1\(14\)e1 | |
| cisco | ios | 12.1\(14\)e4 | |
| cisco | ios | 12.1\(14\)e9 | |
| cisco | ios | 12.1\(14\)e10 | |
| cisco | ios | 12.1\(14\)ea1 | |
| cisco | ios | 12.1\(14\)eb | |
| cisco | ios | 12.1\(14.5\) | |
| cisco | ios | 12.1\(15\)bc1 | |
| cisco | ios | 12.1\(16\) | |
| cisco | ios | 12.1\(18\) | |
| cisco | ios | 12.1\(18.4\) | |
| cisco | ios | 12.1\(19\) | |
| cisco | ios | 12.1\(19\)e | |
| cisco | ios | 12.1\(19\)e1 | |
| cisco | ios | 12.1\(19\)e6 | |
| cisco | ios | 12.1\(19\)ec | |
| cisco | ios | 12.1\(19\)ew | |
| cisco | ios | 12.1\(19\)ew3 | |
| cisco | ios | 12.1\(19\)fc1 | |
| cisco | ios | 12.1\(19.3\)e | |
| cisco | ios | 12.1\(20\) | |
| cisco | ios | 12.1\(20\)e | |
| cisco | ios | 12.1\(20\)e1 | |
| cisco | ios | 12.1\(20\)e2 | |
| cisco | ios | 12.1\(20\)e3 | |
| cisco | ios | 12.1\(20\)e5 | |
| cisco | ios | 12.1\(20\)ea1 | |
| cisco | ios | 12.1\(20\)ea1a | |
| cisco | ios | 12.1\(20\)ec | |
| cisco | ios | 12.1\(20\)ec1 | |
| cisco | ios | 12.1\(20\)ec2 | |
| cisco | ios | 12.1\(20\)eo | |
| cisco | ios | 12.1\(20\)eo1 | |
| cisco | ios | 12.1\(20\)eo3 | |
| cisco | ios | 12.1\(20\)ew | |
| cisco | ios | 12.1\(20\)ew1 | |
| cisco | ios | 12.1\(20\)ew2 | |
| cisco | ios | 12.1\(20\)ew4 | |
| cisco | ios | 12.1aa | |
| cisco | ios | 12.1ax | |
| cisco | ios | 12.1ay | |
| cisco | ios | 12.1az | |
| cisco | ios | 12.1cx | |
| cisco | ios | 12.1da | |
| cisco | ios | 12.1db | |
| cisco | ios | 12.1dc | |
| cisco | ios | 12.1e | |
| cisco | ios | 12.1ea | |
| cisco | ios | 12.1eb | |
| cisco | ios | 12.1ec | |
| cisco | ios | 12.1eo | |
| cisco | ios | 12.1eu | |
| cisco | ios | 12.1ev | |
| cisco | ios | 12.1ew | |
| cisco | ios | 12.1ex | |
| cisco | ios | 12.1ey | |
| cisco | ios | 12.1ez | |
| cisco | ios | 12.1ga | |
| cisco | ios | 12.1gb | |
| cisco | ios | 12.1m | |
| cisco | ios | 12.1s | |
| cisco | ios | 12.1sec | |
| cisco | ios | 12.1t | |
| cisco | ios | 12.1x\(l\) | |
| cisco | ios | 12.1xa | |
| cisco | ios | 12.1xb | |
| cisco | ios | 12.1xc | |
| cisco | ios | 12.1xd | |
| cisco | ios | 12.1xe | |
| cisco | ios | 12.1xf | |
| cisco | ios | 12.1xg | |
| cisco | ios | 12.1xh | |
| cisco | ios | 12.1xi | |
| cisco | ios | 12.1xj | |
| cisco | ios | 12.1xk | |
| cisco | ios | 12.1xl | |
| cisco | ios | 12.1xm | |
| cisco | ios | 12.1xp | |
| cisco | ios | 12.1xq | |
| cisco | ios | 12.1xr | |
| cisco | ios | 12.1xs | |
| cisco | ios | 12.1xt | |
| cisco | ios | 12.1xu | |
| cisco | ios | 12.1xv | |
| cisco | ios | 12.1xw | |
| cisco | ios | 12.1xx | |
| cisco | ios | 12.1xy | |
| cisco | ios | 12.1xz | |
| cisco | ios | 12.1ya | |
| cisco | ios | 12.1yb | |
| cisco | ios | 12.1yc | |
| cisco | ios | 12.1yd | |
| cisco | ios | 12.1ye | |
| cisco | ios | 12.1yf | |
| cisco | ios | 12.1yh | |
| cisco | ios | 12.1yi | |
| cisco | ios | 12.1yj | |
| cisco | ios_xe | 2.1.0 | |
| cisco | ios_xe | 2.1.1 | |
| cisco | ios_xe | 2.1.2 | |
| cisco | ios_xe | 2.2.1 | |
| cisco | ios_xe | 2.2.2 | |
| cisco | ios_xe | 2.2.3 | |
| cisco | ios_xe | 2.3.0 | |
| cisco | ios_xe | 2.3.1 | |
| cisco | ios_xe | 2.3.1t | |
| cisco | ios_xe | 2.3.2 | |
| cisco | ios_xe | 2.4.0 | |
| cisco | ios_xe | 2.4.1 | |
| cisco | ios_xe | 2.4.2 | |
| cisco | ios_xe | 2.4.3 | |
| cisco | ios_xe | 2.4.4 | |
| cisco | ios_xe | 2.5.0 | |
| cisco | ios_xe | 2.5.1 | |
| cisco | ios_xe | 2.5.2 | |
| cisco | ios_xe | 2.6.0 | |
| cisco | ios_xe | 2.6.1 | |
| cisco | ios_xe | 2.6.2 | |
| cisco | ios_xe | 3.1.0s | |
| cisco | ios_xe | 3.1.0sg | |
| cisco | ios_xe | 3.1.1s | |
| cisco | ios_xe | 3.1.1sg | |
| cisco | ios_xe | 3.1.2s | |
| cisco | ios_xe | 3.1.3s | |
| cisco | ios_xe | 3.1.4s | |
| cisco | ios_xe | 3.2.00.xo.15.0\(2\)xo | |
| cisco | ios_xe | 3.2.0s | |
| cisco | ios_xe | 3.2.0sg | |
| cisco | ios_xe | 3.2.0xo | |
| cisco | ios_xe | 3.2.1s | |
| cisco | ios_xe | 3.2.1sg | |
| cisco | ios_xe | 3.2.2s | |
| cisco | ios_xe | 3.2.2sg | |
| cisco | ios_xe | 3.2.3sg | |
| cisco | ios_xe | 3.2.4sg | |
| cisco | ios_xe | 3.3.0s | |
| cisco | ios_xe | 3.3.0sg | |
| cisco | ios_xe | 3.3.1s | |
| cisco | ios_xe | 3.3.1sg | |
| cisco | ios_xe | 3.3.2s | |
| cisco | ios_xe | 3.3.3s | |
| cisco | ios_xe | 3.4.0as | |
| cisco | ios_xe | 3.4.0s | |
| cisco | ios_xe | 3.4.1s | |
| cisco | ios_xe | 3.4.2s | |
| cisco | ios_xe | 3.4.3s | |
| cisco | ios_xe | 3.4.4s | |
| cisco | ios_xe | 3.4.5s | |
| cisco | ios_xe | 3.4.xs | |
| cisco | ios_xe | 3.5.0s | |
| cisco | ios_xe | 3.5.1s | |
| cisco | ios_xe | 3.5.2s | |
| cisco | ios_xe | 3.5.xs | |
| cisco | ios_xe | 3.6.0s | |
| cisco | ios_xe | 3.6.1s | |
| cisco | ios_xe | 3.6.2s | |
| cisco | ios_xe | 3.7.0s | |
| cisco | ios_xe | 3.7.1s | |
| cisco | ios_xe | 3.9.0s | |
| cisco | asa_5500 | 7.0 | |
| cisco | asa_5500 | 7.1 | |
| cisco | asa_5500 | 7.2 | |
| cisco | asa_5500 | 8.0 | |
| cisco | asa_5500 | 8.1 | |
| cisco | asa_5500 | 8.2 | |
| cisco | asa_5500 | 9.0 | |
| cisco | asa_5500 | 9.1 | |
| cisco | pix_firewall_software | 7.0 | |
| cisco | pix_firewall_software | 7.1 | |
| cisco | pix_firewall_software | 7.2 | |
| cisco | pix_firewall_software | 8.0\(2\) | |
| cisco | pix_firewall_software | 9.0 | |
| cisco | pix_firewall_software | 9.1 | |
| cisco | fwsm | * | |
| cisco | nx-os | - | |
| cisco | staros | 14.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F86F790-6247-42F2-9487-3D60A2842F52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5CFBBDA3-8A5E-407D-8608-45C1BD56BF58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "D14EBDCA-7CEB-4394-95EF-D4AEE991E2DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)st:*:*:*:*:*:*:*",
"matchCriteriaId": "F006CA61-42CD-4928-A445-E54B968553C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
"matchCriteriaId": "53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE210B04-7ECD-419C-9258-0F619A353A8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
"matchCriteriaId": "3B467741-B277-4128-9804-E13ED23FD310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7EE856-9CE7-49FD-8ADC-05C580CD54A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "77DDC99D-8B73-452C-94A7-A9A48F2F379B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
"matchCriteriaId": "5145C737-2D5E-4BD4-BA9F-66ED2887A4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
"matchCriteriaId": "C48466C4-5A1E-4C71-8822-32D387B36B8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "12551307-4D72-4D24-BA0D-07235EB762AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
"matchCriteriaId": "08E23131-D207-4D98-96D5-2B71FF792604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E32C808-0471-443D-98AC-DF30AFFE633D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(2b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "593E5730-3777-4DEF-A1D3-73AF0B98448B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF2207E5-7458-40C5-AEF4-73B271EAB3C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7109585-1433-4940-B7C9-C561DEAF1498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F96BEB-19C2-48E4-8884-EA61B32D5BA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3.2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "851EF536-76E0-40E6-9051-7412A8235B4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3.3\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "4E61151D-1658-49B2-AEAA-11F61AB71118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3.4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "49869323-98A1-4258-8D7E-B6DE9DA45CAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3.6\\)w5\\(9.0.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "52BDD49A-6D71-4C33-8B09-C0E9F2DD030E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32B93745-F14C-428E-9A90-47ACE43451EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A0D82E1-CCF7-429B-A637-479E839EAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "4F1B2747-4A9C-44FC-BBA8-39E338B30417",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "65176343-0120-4038-844E-FDE48A920270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xe1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE67104-9212-4E28-886B-ADFA9503DBBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm:*:*:*:*:*:*:*",
"matchCriteriaId": "01F9B9CF-787B-4BE0-988C-669531BFFAA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(4\\)xm1:*:*:*:*:*:*:*",
"matchCriteriaId": "43D88280-5701-45EF-99CA-3056AD2216F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5BB7513-C232-4B4F-BE68-972B05086ABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4F875A-D58F-47BA-A441-2362C1688256",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCEE111-BEFA-4285-B892-58DE3964F497",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA263B60-E7C0-4374-96DF-6E4EB9C16743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "2C570B5A-185E-4AA7-A8B8-BE80605020FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17E7C3-53FE-424F-8F47-7B8C70C9807E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2:*:*:*:*:*:*:*",
"matchCriteriaId": "47E6CE0D-852B-4169-9849-98CDC91E3118",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc2b:*:*:*:*:*:*:*",
"matchCriteriaId": "DD620020-D5B4-4FE3-AEA5-C43686992F74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4705F7-8E36-4C2D-A23C-E6002E459F5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc3b:*:*:*:*:*:*:*",
"matchCriteriaId": "D2A0DF3A-430D-444F-BD02-D18D10245138",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc5a:*:*:*:*:*:*:*",
"matchCriteriaId": "DA39DE28-F3D3-4613-97EA-11896913F300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(05\\)wc8:*:*:*:*:*:*:*",
"matchCriteriaId": "27476F7B-9DD2-4A7F-8C0A-65EF52F70DBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9:*:*:*:*:*:*:*",
"matchCriteriaId": "758CF4D4-46B9-4EE1-9C43-0620D1C31EFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc9a:*:*:*:*:*:*:*",
"matchCriteriaId": "62559EC5-D019-4C78-B589-80E16784A821",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc11:*:*:*:*:*:*:*",
"matchCriteriaId": "E52672D5-5DFD-484E-9463-522AA4348456",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wc13:*:*:*:*:*:*:*",
"matchCriteriaId": "DE397409-D527-4283-833C-8A79F3CF8749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)wx:*:*:*:*:*:*:*",
"matchCriteriaId": "F92CF99B-5043-4EDA-965F-3D8F32F9D742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "15295BD6-CC76-41BE-B5A0-A08888207011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk:*:*:*:*:*:*:*",
"matchCriteriaId": "1423776F-1C73-4872-81F6-29C411B6E545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xk2:*:*:*:*:*:*:*",
"matchCriteriaId": "06FA18C8-0152-4035-8C6F-9AAC4B1985B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn:*:*:*:*:*:*:*",
"matchCriteriaId": "49DB7F15-B0C2-4EF0-A3E7-6DFD03C0A25E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xn1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AE88EB7-215B-4FCA-82DD-AC2A9D243323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xs:*:*:*:*:*:*:*",
"matchCriteriaId": "763A8E4B-B394-4EB2-829D-70A030551D36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)xu:*:*:*:*:*:*:*",
"matchCriteriaId": "198E5016-4494-4BA0-BC9A-C588264F79E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5\\)yb4:*:*:*:*:*:*:*",
"matchCriteriaId": "83B3A893-6322-4E04-803E-1D18224E7AF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.1\\)xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB89FCC-6602-4B41-9BFA-91B0B48827A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.2\\)xu:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DF5835-5DE4-4C4E-BFF3-2B15B01771B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.3\\)wc1:*:*:*:*:*:*:*",
"matchCriteriaId": "238DCBE2-E511-42D1-B938-3FA15E4969E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5.4\\)wc1:*:*:*:*:*:*:*",
"matchCriteriaId": "10065276-0C45-4B35-8ACC-9EB8A73E5739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(5a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "21703640-6091-4136-A2A9-B046E0A8406E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ECCE69A3-41C6-4893-86D4-7F264352C8A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(6b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C575430A-762A-405F-95DA-92589BF4C611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)db2:*:*:*:*:*:*:*",
"matchCriteriaId": "1AA412BD-1EFD-4FE2-AC6D-E9AC93B1F750",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)dc1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E45CDF-F745-4336-B5D2-0917C66C1D08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "AE808362-AFA6-4270-8ECE-8FFD10EE3678",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)sc:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA0B5C8-9BB3-40BC-ADED-3A21DD019A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "FA654CE6-82C3-43D0-BAED-70E88A740BF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1720AE47-5ED4-4E5D-AF25-F9FD7E43F6D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "E339A080-2572-4764-BB7C-F49F66432BD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)wx5\\(15a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2318131B-BA10-4C44-8F90-215CDA28576D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe:*:*:*:*:*:*:*",
"matchCriteriaId": "E83EFCCC-D01E-4F0E-9990-1F323167B430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xe2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E737A2B-8B1A-4F53-B1AA-ECB354D10D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf:*:*:*:*:*:*:*",
"matchCriteriaId": "0C977C71-7F61-444C-A0E4-14E5269E6B4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xf1:*:*:*:*:*:*:*",
"matchCriteriaId": "533BD959-48CF-4664-B4EC-37314AB93EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk:*:*:*:*:*:*:*",
"matchCriteriaId": "5EC5E6E9-E639-424B-963D-2760B2C38D8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk2:*:*:*:*:*:*:*",
"matchCriteriaId": "EDDCC99B-BC23-4101-9D73-A21107FF8630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xk3:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED4869D-EB53-4A7B-A630-69B8D76D48DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7\\)xv:*:*:*:*:*:*:*",
"matchCriteriaId": "9B5AE2F8-53B5-4B13-A1DB-57E2531943A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7.4\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "EB26AA22-D05C-4B88-8E1B-63A8EFE6A841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(7a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D6833BBD-CB8C-40E3-BCB1-193E0E03A95F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "387FCCC1-B05D-4493-9F05-BAC5A0E57F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "33E0F459-8A71-4FAE-BE7A-6C56E28988BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8.0.2\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "F7976536-FD4C-4AE7-8838-6E28E0CFE740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8.3\\)sc:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D2F695-9A42-4425-8CA6-63CB8E99F893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(8a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4E63F87A-7BBB-4619-935E-F1F0C3C7E322",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1B6ABDAE-182B-4367-80B6-B8C8ABF92059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA03CF9-26C6-4621-B73C-EBABB20CB250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(9a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0B94014A-8415-4174-AF4B-C9026C6EC559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "66FEB240-8BB9-4AD6-8188-836D866F4F3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)s3b:*:*:*:*:*:*:*",
"matchCriteriaId": "F5F41EB6-4214-4A86-BBB5-619154971F7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "14E5113C-945B-40CB-9F5C-0B7063704364",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "AFB25BAC-590E-4496-AB43-64A8EEBFDCBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5:*:*:*:*:*:*:*",
"matchCriteriaId": "75528B66-3966-4299-B9BD-69B039AB2F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09DFBF77-BBE3-41BA-A6C6-32DD555F0AF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10\\)w5\\(18g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "77D178AF-15CB-4352-8193-741F8B49688A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(10a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1863F9E2-9FFB-4C19-92E3-15DD9ED72608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(11\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "403EE717-FD69-405C-9544-6349CBE09D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(11\\)st4:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF987B2-BA35-4933-85F7-7F3F2C732961",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(11a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D77A942A-4A2C-4A87-A866-12B758DB645B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "63FACCFF-1222-4C02-A286-717E954A7ED1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(12\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "07E0B16B-D4C1-4140-830F-4F5C0D90AD42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(12\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "A15063AA-2800-4856-B3F2-F727BE44BAA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(12a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B3C8355-42F3-43DE-A2D9-0B77138461FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BD6B1C-DDA0-4C64-84C5-68F51BFAB457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "050F0FAE-8871-4A14-9180-4779014D9BCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)w5\\(19c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B92AE5F7-DD9A-486C-AB39-580E8E29EB75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13\\)wt6\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "45246611-F8E6-4DD5-967B-815048CCAC65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(13a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3572607D-5E92-4706-8B83-C5CF01E63416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "60C7CA43-AB0C-4085-BB46-78A622241E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7B8E04-A044-4A32-ADB7-9C25B32E9F1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "EF44B838-8E44-4281-94FD-922A60047F48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)st:*:*:*:*:*:*:*",
"matchCriteriaId": "353010B4-3E37-4451-9B17-EF5701DCE9B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)st3:*:*:*:*:*:*:*",
"matchCriteriaId": "828D84E5-E8E4-4425-9E35-B1EBDBE245BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14\\)w5\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4BC109F5-0907-4CDB-90BD-61788921DABC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(14a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "279DBE65-0402-4205-8820-48EB20386DB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "E8ECE5F1-5153-4F93-9618-CF7AD2B3C426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC97D92-C82C-4CBF-93E3-4215B11FD896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "295B139A-50F6-48E7-B42D-9A53BCA3777F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "992DF258-DAEC-4EF1-941D-7DBD347546B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)sc:*:*:*:*:*:*:*",
"matchCriteriaId": "52531223-05D2-41C7-ADE2-E957443297F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15\\)sl:*:*:*:*:*:*:*",
"matchCriteriaId": "C4E611A0-B984-47A6-95F3-B582EE0766E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(15a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6E93E4A5-6D2B-4E79-B713-7CA1BEE0E36C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BF480A-AD29-4CE3-9B88-E917D75F3FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8:*:*:*:*:*:*:*",
"matchCriteriaId": "2657AD4D-F324-4527-9C4F-360946FE0D89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)s8a:*:*:*:*:*:*:*",
"matchCriteriaId": "211CF1C3-3A5E-49CA-9D01-AC3DB4A7159E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)s10:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C19B39-258F-4A26-B751-8E9AB4807718",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc:*:*:*:*:*:*:*",
"matchCriteriaId": "641A5B81-B92B-4A65-9828-C7795B0AB4C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)sc3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD766E23-7CA6-4CC3-9CFF-4E81E370CFBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)st:*:*:*:*:*:*:*",
"matchCriteriaId": "5E68F0B5-D6B5-4012-A563-346FD83AC9B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)st1:*:*:*:*:*:*:*",
"matchCriteriaId": "39C3D66E-C49F-4A41-B67E-D9DE768356FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16\\)w5\\(21\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09D35D67-529A-425D-800A-D986297D42C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16.06\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8BD083-812F-414A-8E21-A8119D3ADE7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(16a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DD09CC38-FBBD-44DD-8322-F642DC8B6F3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6342713F-C4C6-4451-9637-B744311EC287",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "F95185E5-65CF-478B-B450-2FA9C05E4A13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "D281BAB0-994A-418A-8FB9-C8F6509DC56E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5E2F5D-ED58-44F3-A26D-D93DCF093C1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl:*:*:*:*:*:*:*",
"matchCriteriaId": "04586FE6-78BF-4171-8A6A-EFAC90BAC8F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4444CF9-66F8-4941-8300-4547BA7C164B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl6:*:*:*:*:*:*:*",
"matchCriteriaId": "33C204A1-935D-4CFF-8FBA-9A6E37597E6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)sl9:*:*:*:*:*:*:*",
"matchCriteriaId": "C88479A3-251A-4D36-9737-CC454640E9F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)st1:*:*:*:*:*:*:*",
"matchCriteriaId": "6CA42C30-EB70-4030-9D02-0F3635C980EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)st5:*:*:*:*:*:*:*",
"matchCriteriaId": "4A4EE26C-9B9D-41B5-9E0D-46D599EDE8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17\\)st8:*:*:*:*:*:*:*",
"matchCriteriaId": "1A125557-4893-4C74-800D-D5A2FCFE6C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(17a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A3F7B649-548F-46B5-BC0C-AB4013CF290F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "3E4D37B0-460F-4F16-B4F4-33A4DB80FC79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "6018992E-1FB3-4ED8-ADC3-3BA49B76165D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)s5a:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF6C534-3DF7-45A5-8F76-DF75A7EB0E97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "684ED113-91F6-41BC-BAF5-62041D850F2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)sl:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6E2071-516B-41B6-A897-799B66907FFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)st1:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEE0CBD-9810-46D0-87B8-0B46926C2F67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18\\)w5\\(22b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C6710AB1-42BC-4612-99EB-4E3C9A811E30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(18b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8BDD3722-C5FC-4AD0-83D3-7E5D2F4B51E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "13BB143D-CE87-4B5B-8B41-F641C160624F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "53BF4CAE-9C49-412C-A3F3-F365D2E0F619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA28B36-9E53-4D2C-9ADB-C878182DB688",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)s2a:*:*:*:*:*:*:*",
"matchCriteriaId": "801F584F-A11B-4C28-BF74-2917BED984DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6B7A5F-DFE1-4597-B121-BF4714CD2E3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl:*:*:*:*:*:*:*",
"matchCriteriaId": "8F7D5266-C127-4CF4-B1CF-3D639A9E204C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)sl4:*:*:*:*:*:*:*",
"matchCriteriaId": "A78459C5-2762-4652-8D34-772F3A025381",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)sp:*:*:*:*:*:*:*",
"matchCriteriaId": "96C97A75-1498-40A2-8569-581FB3D13598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)st:*:*:*:*:*:*:*",
"matchCriteriaId": "52877E55-8DB4-4E4E-BBA1-72F2E1B0C6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)st2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0B9AD4E-CF9A-4772-9E84-6C11401245A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19\\)st6:*:*:*:*:*:*:*",
"matchCriteriaId": "5B83B0C4-897E-487E-939F-1E40144399EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(19a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9ECD6C4-10AA-4B34-96F3-7EF6A093EDE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)sl:*:*:*:*:*:*:*",
"matchCriteriaId": "4017470C-5EB2-4E30-834F-EAAF1738B8FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp:*:*:*:*:*:*:*",
"matchCriteriaId": "67EC4390-6EDE-4235-83C9-DE8B0BE74539",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)sp1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C89179A-562B-48C7-A4ED-E98ABC855972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)st2:*:*:*:*:*:*:*",
"matchCriteriaId": "B9032AFE-430F-409F-9558-F2179CE19087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)st6:*:*:*:*:*:*:*",
"matchCriteriaId": "587A531C-B3EF-4B7F-872B-7481E38BA785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)st7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F59E7FC-C1AB-4C4F-B1A6-2A30FF64405F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)sx:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6C9A4F-1F21-4AF4-B694-6A6F3A6C2170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20\\)w5\\(22b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F54D02AB-FED4-49C8-87C4-1745FA867A31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20.4\\)sp:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAFB5F7-4343-480B-B3DC-7ADC66582983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(20a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1734A3F8-45A2-4590-9518-0753F503433D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8735B4-CD22-40E7-B7D2-C7A4B559F7D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "7EAB9029-DC45-4F55-A4FF-F6DEEDFFA150",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5310F83-EB1F-423C-A5EF-681FECAD66FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s4a:*:*:*:*:*:*:*",
"matchCriteriaId": "390D496F-AFFE-4CAA-AA27-66E8C755887C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s5a:*:*:*:*:*:*:*",
"matchCriteriaId": "21CB6075-DB61-4BDE-BD9E-4DBE06CF25E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "E9AB2EF6-03CC-4C83-B81D-E7C4B2C03B82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)s7:*:*:*:*:*:*:*",
"matchCriteriaId": "6B88B203-B522-428B-A273-2DDFF9CC2898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)sl:*:*:*:*:*:*:*",
"matchCriteriaId": "F3408ED7-AAE8-4BD8-9A1C-B7F048C63CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)st:*:*:*:*:*:*:*",
"matchCriteriaId": "466E247E-5514-4489-A169-513115AB42D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)st6:*:*:*:*:*:*:*",
"matchCriteriaId": "7CEEF0AA-002E-4768-9302-B7CCBBF25C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)st7:*:*:*:*:*:*:*",
"matchCriteriaId": "911BBC74-F18B-470A-A1E9-4D67F5866D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21\\)sx:*:*:*:*:*:*:*",
"matchCriteriaId": "08A4E74E-DE87-4787-8E2E-3C7D77E02224",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(21a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "442338B0-C242-45A1-8860-4386A5033C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(22\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "6070D9A2-9A74-46B1-979D-F3F80D69513E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(22\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "9DBB2CF9-2F36-4CA8-8814-C34AE5620942",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(22\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "7498FF80-0A4D-4510-9C1A-DA24E1A4A4E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(22\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "312DB4D6-81B5-44C5-B99F-D56603C00B98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "D448CA2F-8C4B-4834-8B36-B2E60D7A2D66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBAB365-6B58-44D2-A078-B3B4369CA32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "332C413B-7AC7-4475-A968-9D0B7EF14B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "35999D5E-F831-446C-B509-F1531A2D1DCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "67DEFA98-F2AE-437A-8BE3-7F021C0AE76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)sx:*:*:*:*:*:*:*",
"matchCriteriaId": "02F37758-9AC2-4CAA-8A09-5A59FC622267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(23\\)sz:*:*:*:*:*:*:*",
"matchCriteriaId": "53D11EA0-B7E1-46F5-9FCE-0812A7DD776D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3630462-F414-4D6B-8766-7CED5366C852",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D6D0C5A-87C7-4169-B9DC-2AFA217888F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "58DF5979-73D5-4B2E-B98E-CD0AB8517F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "1EA92F7A-C14E-4186-8E96-51D2BDC40DE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "F451B6F0-429F-4B75-93F2-52AF4F65D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(24.2\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "8C3E9A9A-B80F-43BD-8A63-762B60D6DBE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(25\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "3C634FD5-0716-435A-8D5A-0640DB34C069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A0CCE7A4-A7EC-4926-90BA-B4AA87DAD99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5\\(27c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00EDE5CF-FFB6-463A-B55A-53D76F3B7670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(25\\)w5-27d:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8FB0C2-4ECA-4371-B874-2496232965A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(25.4\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B5A4482-9555-4DA0-87CB-3F17EE84EA2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C17DD4A5-9E82-49EF-965D-DF714DDBFF44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "25058DEF-01CC-4148-923C-7AC433D82E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "179CEE21-E5CA-466A-BAF0-8936F2E0B06F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F22B210-D1B8-4875-BDF2-2BE5B116B527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1E0BA5-4A57-4D26-A453-A4D5D56DE66B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1D95BA23-C2A0-4659-B664-0B7FE74D9E34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(26\\)w5\\(28a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FE1C0D16-5167-4A29-A8C8-3EF603AA8894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7A300584-6480-410F-8399-092682A62435",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "00682210-2C86-4912-A423-5F7011C2FA2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5C5244-8E39-41AE-931D-D935DC3CE00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv:*:*:*:*:*:*:*",
"matchCriteriaId": "498F4C0D-393D-4406-9752-4E49D6BB42B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv1:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C87916-D186-4E36-A4B6-5FA858FFC7E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(27\\)sv2:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF9C316-FF3D-4C52-A770-B8597895BA06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28\\):*:*:*:*:*:*:*",
"matchCriteriaId": "816276EF-A529-4522-9F49-80E9FF64F795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "1336C42E-DA75-4DBC-81E1-70DD987EE54B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "8D7042F5-2878-45B2-856B-5EBC93A2BE0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5\\(31a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2B74536A-EC0C-4C39-BA91-72990A4886E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-30b:*:*:*:*:*:*:*",
"matchCriteriaId": "37E48A25-53DE-4A07-B6B2-A275F390ABAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28\\)w5-32a:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4789A3-692B-4BC4-8A91-1F576C27C8B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "43C4011A-B88C-49BD-B798-786EAC87EB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(28d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F864A21-658C-4789-940C-E915F6C9F8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(30\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "D49C8C12-CE1E-41B9-991D-CC3AE51FEA8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(30\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1DAEE2-8026-46DA-A652-6E0CD5A6A657",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(30\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "616EA4E3-C5FC-4145-963B-E3ABAFB5E5CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(31\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "3B896570-8184-4EC8-8EB3-95312E4ED869",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(31\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "5743923A-A78D-4C8C-99C5-5063A609700C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(32\\)s12:*:*:*:*:*:*:*",
"matchCriteriaId": "7F505B0A-E9E0-4CF3-B85B-70EEE71314F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(32\\)s13:*:*:*:*:*:*:*",
"matchCriteriaId": "ED66A91B-6429-4983-8167-07DECA601916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(32\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "0F288884-3DB7-474D-B56B-120E2DB7975A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(32\\)sy9:*:*:*:*:*:*:*",
"matchCriteriaId": "A29860C6-75E6-43A4-8BF5-E6ABF2040B0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(33\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "AF0C8019-BDDA-4019-AF64-352EFFAC9036",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0\\(33\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCFE974-9D9A-443D-A55D-6A2CBF96EC4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0da:*:*:*:*:*:*:*",
"matchCriteriaId": "12434A88-88C6-4749-981F-E2B4D725F48F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CF26C-AEAA-42D7-8136-56E77E73DCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0dc:*:*:*:*:*:*:*",
"matchCriteriaId": "1A4864A2-D6BB-4E2A-9AA4-519EE0732D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0ev:*:*:*:*:*:*:*",
"matchCriteriaId": "84299245-5091-4ED5-A107-4F7A2BE499E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2C398460-3F38-4AA7-A4B1-FD8A01588DB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sc:*:*:*:*:*:*:*",
"matchCriteriaId": "793F494D-F6BD-4B23-92BE-83B9DD9D4A5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sl:*:*:*:*:*:*:*",
"matchCriteriaId": "2B6B0C2F-2FBE-4422-AD30-305100C595CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sp:*:*:*:*:*:*:*",
"matchCriteriaId": "932C1AC0-0BD1-46DF-A241-AA71BBD785BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*",
"matchCriteriaId": "DBEA01D2-B985-4575-AF00-144CE2E3024D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sv:*:*:*:*:*:*:*",
"matchCriteriaId": "3999B90E-FE66-4B5D-8186-66C658855D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sx:*:*:*:*:*:*:*",
"matchCriteriaId": "5C11A2BE-19E7-4148-B3CC-B4956B07273E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sy:*:*:*:*:*:*:*",
"matchCriteriaId": "65E78DEE-1125-4183-A0CD-947B850E956E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0sz:*:*:*:*:*:*:*",
"matchCriteriaId": "B6943D9D-4A73-4EB2-B5C5-B7132AFFBE2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"matchCriteriaId": "CA7F94E8-86FC-456B-A7BB-57953F67F754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0w:*:*:*:*:*:*:*",
"matchCriteriaId": "277BFD67-3EE3-4E79-8D81-35597D168C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0w5:*:*:*:*:*:*:*",
"matchCriteriaId": "5A92DCEF-C205-4145-91B0-DB9991130457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wc:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B5CC91-144D-4818-871E-E6120A7E1050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wt:*:*:*:*:*:*:*",
"matchCriteriaId": "23E5F43E-20DA-4C5C-B8C5-1A5512CA07B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0wx:*:*:*:*:*:*:*",
"matchCriteriaId": "C6333F9A-2605-41EE-9AB4-1D04C5825BAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xa:*:*:*:*:*:*:*",
"matchCriteriaId": "1050ACB3-E5B2-4710-910B-F3DF4B49907F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xb:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE71F9-17D4-47C4-A762-18CC8716E477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xc:*:*:*:*:*:*:*",
"matchCriteriaId": "7977DA9F-41DE-4482-B0CD-896EEEFB5689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0A8D1D-ED94-4A2E-ACC5-0408C2C9FCFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xe:*:*:*:*:*:*:*",
"matchCriteriaId": "1ADAB898-7728-4C14-B69A-7B8B06AFC894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xf:*:*:*:*:*:*:*",
"matchCriteriaId": "DDBE69A0-85B1-423B-88FB-CDA80E9186EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xg:*:*:*:*:*:*:*",
"matchCriteriaId": "C14C28A4-91C1-4AE0-8A14-8E98A569F7B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xh:*:*:*:*:*:*:*",
"matchCriteriaId": "54424787-34AC-410D-985F-511ADB2BB144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xi:*:*:*:*:*:*:*",
"matchCriteriaId": "70F54F0C-AC91-4CB7-9FEB-257F03547864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xj:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A0D017-F26F-4429-891E-C7E1C66B6588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xk:*:*:*:*:*:*:*",
"matchCriteriaId": "26FA075D-4A9E-44EE-90CF-23947C9040EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xl:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3DFAEC-4534-4A8D-9886-0723F57C7A63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xm:*:*:*:*:*:*:*",
"matchCriteriaId": "E5451772-87D4-42E2-8F48-D137670DA3E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xn:*:*:*:*:*:*:*",
"matchCriteriaId": "D162976F-87A3-42BF-8C9F-A981B14F4673",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xp:*:*:*:*:*:*:*",
"matchCriteriaId": "E2606209-91BE-4BEB-A163-0D3873A033FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xq:*:*:*:*:*:*:*",
"matchCriteriaId": "43581A57-418A-4A35-ACF2-1380A8DA8A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xr:*:*:*:*:*:*:*",
"matchCriteriaId": "AC17E231-9256-4600-A33B-238E7E83CF85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xs:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D5468-BB6A-4665-964F-D8F636359CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xt:*:*:*:*:*:*:*",
"matchCriteriaId": "F0AB67FC-88F4-42BB-BB90-54521950DE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xu:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0082D5-CE3E-433A-84E9-1311C8B7899A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xv:*:*:*:*:*:*:*",
"matchCriteriaId": "00EB78A4-B386-4FCB-A21F-BD2B2EFC9616",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.0xw:*:*:*:*:*:*:*",
"matchCriteriaId": "7ED30640-AABE-4CA2-8B45-509270748BBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D86E0B83-3098-47A6-9298-43D3D5F476DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)db:*:*:*:*:*:*:*",
"matchCriteriaId": "960F3C8E-AB3A-4A73-A1B8-E4DD98FACF14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)db2:*:*:*:*:*:*:*",
"matchCriteriaId": "516E4BEC-B9DA-4E21-9271-742F1CEDA087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc:*:*:*:*:*:*:*",
"matchCriteriaId": "E9829AB1-BB64-4D0F-88BB-894FCF9CA2F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)dc2:*:*:*:*:*:*:*",
"matchCriteriaId": "C0ADD1EB-B46F-4B8C-BF4D-5A9631BDFA0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "A09F6AD8-4B16-465A-9781-1B650062FB6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "96541BD7-7D90-4C56-BC23-7071A07711DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "89AA56EF-E123-4539-80EA-B94965EAA2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1.3\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "605C83F3-9159-4D8F-90C4-886543D2BBCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1a\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "9EDD9202-56A8-4924-AC60-08B223D5C3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E960CA4-679E-4748-ADDA-D122C5A2D331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "326374ED-7ADC-457A-A8E1-4C42CDB8F3BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A0B63E-5CCF-4441-A6A1-B4EE1A556070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf:*:*:*:*:*:*:*",
"matchCriteriaId": "6255AFC2-DAC7-40AE-BD1C-3BFEB5544FF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf4:*:*:*:*:*:*:*",
"matchCriteriaId": "CF37C54B-72D1-4D7C-B0BA-0D9C7BA6C80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(2\\)xf5:*:*:*:*:*:*:*",
"matchCriteriaId": "BDF1C787-B425-44FD-8C9B-8F6BFDD42BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC077AA-909C-4344-B5A9-F71FBCC34B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "E4C9A6C0-F89B-4C11-B415-D78693C0E83E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez1:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7E0FE-ABA8-4423-A126-EE56E4AC6E98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ez2:*:*:*:*:*:*:*",
"matchCriteriaId": "4B3C6083-0A69-4B38-B7AC-9F7DD4D41BA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A759C05-80B5-4A5C-8B9A-C0AC13638EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6.5\\)ec3:*:*:*:*:*:*:*",
"matchCriteriaId": "93063C37-AEEA-47EE-A87A-5BB4BB76F416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CDAE896A-4B97-4E67-8A55-046AB7CC0C80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A0C0CF63-FCC4-427A-9A86-48A03D913726",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7\\)cx:*:*:*:*:*:*:*",
"matchCriteriaId": "DB234FEB-C185-420C-87C0-B54E9463D24D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7\\)da2:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFE5890-AA06-40A5-B02B-F6E02D6749BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7\\)da3:*:*:*:*:*:*:*",
"matchCriteriaId": "0E621324-E76F-446D-9477-DE68A28206F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "1481AA47-0E3F-4B64-B8EF-13358EDB4B8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7a\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "7E24AB6D-AEDD-47D2-868E-7C2801B8A667",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0A9F96-4BBC-4154-8098-2E6CD2B9391E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7a\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "43155865-F9DF-43E9-B688-246AD46FFA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(7b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "989069B1-5B8B-4F6E-BD76-3B2999F2BC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DF384E8C-2EB1-4747-B749-E89E25A77321",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)aa1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA2FB3CC-64F1-4204-A04B-BCED3ADE7102",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D37BA51-A0F6-4CF4-A729-44C1060DEBD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "F1D0F1E8-B2AD-40A2-A7A5-8AF0D0198E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "09C8E9BF-1C07-47FE-8F98-ED5960D302FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea2b:*:*:*:*:*:*:*",
"matchCriteriaId": "4DFD542A-C3E0-4E81-AA6C-D32BE269B6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "72BC63AE-31B1-44E7-BABF-B8C529283E90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "429E111D-F383-4DCC-A378-D7F15234E059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ew1:*:*:*:*:*:*:*",
"matchCriteriaId": "F9B45852-A773-40E0-97D5-4F4A5F6E8D2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8a\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA87A2A-E394-4EA4-82BA-9CA3A561C8E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD2B299-8C70-444B-9AEC-B9EAD4650C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "37EC9304-51E7-4147-820B-E6DFA9267617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e14:*:*:*:*:*:*:*",
"matchCriteriaId": "DFF5CF62-C9A7-43C7-82DD-3CDAD6218D1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e15:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1AAD07-8EA0-496D-A4A7-6DD72B711813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e16:*:*:*:*:*:*:*",
"matchCriteriaId": "25619ACF-6813-4470-B1F6-0D05D155DFA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e18:*:*:*:*:*:*:*",
"matchCriteriaId": "B7258C5E-8D61-4ADF-AF7D-F772C0A14C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)e20:*:*:*:*:*:*:*",
"matchCriteriaId": "4859372A-D2F6-4D97-939D-91A28B65B1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8b\\)ex4:*:*:*:*:*:*:*",
"matchCriteriaId": "C47237CD-540B-462F-8B29-AC1EF4AF868B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3184A435-713F-499F-83D5-51233607861E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F2C03276-B783-49BC-841B-6A75FFDDCBF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)aa:*:*:*:*:*:*:*",
"matchCriteriaId": "E8737806-D06E-4859-ABC2-B6D764AA74A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "61B04BC6-B6BD-4CD2-9257-B7493B33ADAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "718E435B-14E4-45AD-8565-CAE1F245772D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "CB79AFC9-2863-4DAE-9235-56DBD7C4E066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "2465A016-415C-4EE9-9DEC-B71C3EDC0BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "71655A8A-9E5F-4B48-A490-2A3110230DCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FB6D148F-D29B-4610-85EB-557AC86C7FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\):*:*:*:*:*:*:*",
"matchCriteriaId": "791F8D35-C80C-4540-9FD4-A957F429C712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)aa:*:*:*:*:*:*:*",
"matchCriteriaId": "68E75B85-BD83-4183-8738-10B7ABFCD333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F32F2780-796C-4A03-BA5C-3B0CDCD2FEB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "2046F5A7-EA7D-4C6F-9B93-467AB1CC2624",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "AA022E55-1EC7-4447-8B1F-1DE2102F71FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "11032330-069D-4E4A-8F65-BC9EC832EC24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9352A8-5C48-46D7-A9B9-61C6D003E9D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "401856C7-EDE5-4B89-8A09-EFC2F878E753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10.5\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "95257024-EEB8-4111-BC17-82173B759397",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(10a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CB900989-74D8-4DD2-93BF-5A6D50E48213",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D9B0EBB1-E870-4794-9474-F4E2A8AFEC49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "580BA1FE-0826-47A7-8BD3-9225E0841EDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "91195861-AC53-4468-B1BB-3144A6F3CB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "238FC81A-606E-49ED-B97C-432A82BF7318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11.5\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F6D3C225-A31E-4E61-9B90-BBD38A8F6C0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "330A2017-426D-4D6D-86A1-1D063038366E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7FC01431-DCF5-4F12-B95C-4F0813A04070",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "040B04CD-B891-4F19-A7CC-5C2D462FBD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e12:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF29685-7FFC-4093-A1D4-21E4871AF5C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11b\\)e14:*:*:*:*:*:*:*",
"matchCriteriaId": "E72872C9-63AF-417F-BFAE-92B4D350C006",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7DA6CBB3-6F8D-40D4-9511-C9DD6F703C14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF2C4D9-65CC-4C27-8240-C8F00F38A3F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F5A3BEF7-B34D-4D07-A8E6-834F555D0468",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4DC4D8BB-2A95-4A57-AF3F-1CD01F55D62F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93AA3BC4-C536-4EEF-85E3-D521580F18D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "2E8C082A-A9B7-4333-9ACB-CB75DCB73973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "1EF8CAD4-6B77-4B1F-B3EF-05873051949C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ev01:*:*:*:*:*:*:*",
"matchCriteriaId": "014D2124-5158-4FCB-A831-9457CA435A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ew4:*:*:*:*:*:*:*",
"matchCriteriaId": "5E89EF44-F094-4002-A325-C765D5CB9B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7C9A3703-1082-45A6-B510-9B6C880F14A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ay:*:*:*:*:*:*:*",
"matchCriteriaId": "7E473130-ED52-48FA-AAAD-A1EA427AEBE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9478F31-994D-4FD8-AC53-B000815FBA92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB275FD-926E-4875-AAA2-88F8DB3B8B98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "D3EEC237-DD65-43F0-9DFE-0D32C929153E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "80BCF196-5E5A-4F31-BCE7-AA0C748CA922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e12:*:*:*:*:*:*:*",
"matchCriteriaId": "EE497DA8-240B-44DE-92F4-6CAC88A89B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e13:*:*:*:*:*:*:*",
"matchCriteriaId": "2EFCFBFD-E998-4581-B7C1-5A8BFA27DE82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)e17:*:*:*:*:*:*:*",
"matchCriteriaId": "337A0980-A5B4-4605-8572-8283FD1588C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC069569-859C-41DB-93FE-57E8B3F2EBCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "17B63153-D51A-40AE-887B-CC9362263602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3F54C6-FD33-442F-9E82-510EA39B0A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ew4:*:*:*:*:*:*:*",
"matchCriteriaId": "A6568612-226C-48A3-B619-4C540D05968A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "20A9F169-F1BB-4D40-81CF-9772B4E3BFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13.4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "8E6CA25F-5D9A-4996-AE41-FCF9BB9A6C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C0097ECF-6FB0-444C-997C-7FA44E82321C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "F633F237-0B44-482F-A120-53A90EE0A328",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0E2DFA-B2B6-4FB3-97DD-D1167014323F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "6277E1AB-5962-47DA-BCBB-B6BF3A5BFAB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "ED09E588-89E8-416F-9A7B-0CF73807998C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "F1229A52-54B6-478F-A419-8D0340336BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "2652E42C-E7FF-405A-8B6D-47C28A62757E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14.5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5A69E21D-CF3F-4A57-9088-C9FF1C0ED5A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(15\\)bc1:*:*:*:*:*:*:*",
"matchCriteriaId": "D61DA1C6-B112-448D-8E23-07800DA3E3CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(16\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C2FA390A-9AE1-4C7D-906B-EFB5F927CC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(18\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2A8C2D22-61C6-4CA5-A275-DAEE2CD7D3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(18.4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8A4ACEAA-2B21-4C3B-AA12-235626E54581",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4944AFEF-D002-4C86-958A-4EB753399FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "00DEF5CE-8637-42DA-A371-AC9BF74D213F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "970939C5-1E6F-47B6-97E6-7B2C1E019985",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "46C3903E-94DA-409B-A0E9-A66BCB48204E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "54874F5C-4165-4CFA-9908-587A808CF3A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "184BB6B9-4E7D-4107-BFBA-847329C59209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ew3:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B06D76-49C9-412A-95C8-4C78C303488D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)fc1:*:*:*:*:*:*:*",
"matchCriteriaId": "17C19283-A797-4508-B180-0EA5A1D14310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19.3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "4F62D015-0F71-4B7C-9B75-04F495725DF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DFC9A03B-752D-4F68-B360-CBE2EDBFD8F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D0C3B6E2-3D33-457E-B85D-8C2FC9DA2FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C41AB141-A566-4738-8E07-E6410590FB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "F074DF74-81FA-4F09-A6E5-18DD9A4E76C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9689234D-7762-4BA4-827E-702407F5BDF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "A390527A-7522-4580-8C0A-F68BF90A5CFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4041EB0-F402-4C01-9337-212E3E461AF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "00388B56-F514-4A9F-95FE-1D8239BE1EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec:*:*:*:*:*:*:*",
"matchCriteriaId": "0DEB16EF-D0C1-4C56-85B1-3C07D8CFD493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "DFCFD88F-4320-4F4F-9CAD-BA8A5AA5D389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ec2:*:*:*:*:*:*:*",
"matchCriteriaId": "D89132D4-850A-4C33-BDE4-51F6A053C848",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo:*:*:*:*:*:*:*",
"matchCriteriaId": "ABF2BEC0-6D37-4BC2-9A78-FC0D06CE7573",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BBCCE83-076A-4B0C-9331-B9FE7DA8278E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)eo3:*:*:*:*:*:*:*",
"matchCriteriaId": "AA0B22A1-8B4B-4ECD-89B3-EDB5A14D1799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "379E0F70-EE01-48F9-A4F0-BFCF9BDAB4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew1:*:*:*:*:*:*:*",
"matchCriteriaId": "17CD0C63-7500-4A32-BD85-27E6C2F70FB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew2:*:*:*:*:*:*:*",
"matchCriteriaId": "CCDFD76E-0668-4137-A747-8FDE700A3B13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ew4:*:*:*:*:*:*:*",
"matchCriteriaId": "17F7143A-9B42-47FC-8626-19A850A74E45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1aa:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6FFE33-2891-48E5-9D0C-C52F88B2D76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ax:*:*:*:*:*:*:*",
"matchCriteriaId": "442972CD-50D3-4C46-AB73-44AED94B9F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ay:*:*:*:*:*:*:*",
"matchCriteriaId": "19077C39-A27B-4EC3-A882-9AC826E61570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1az:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B31AFC-9C72-4737-B6B7-E938C13695BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1cx:*:*:*:*:*:*:*",
"matchCriteriaId": "FDEF6AED-4477-4AAC-9759-1996B77DFEE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1da:*:*:*:*:*:*:*",
"matchCriteriaId": "C9427851-B0DC-4CE6-8BFA-60619D1DC87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1db:*:*:*:*:*:*:*",
"matchCriteriaId": "6D07DD94-0925-4FEE-9565-5F36B9AAF448",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1dc:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3A67F5-05C6-4097-A88E-0A0F165C12EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "7126E176-D739-4102-8F10-1EEB8C6A219D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ea:*:*:*:*:*:*:*",
"matchCriteriaId": "E90C0554-1A50-4341-AB07-80AA854673D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eb:*:*:*:*:*:*:*",
"matchCriteriaId": "4A8C5149-40F8-40C9-9FC3-7E7C68801320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ec:*:*:*:*:*:*:*",
"matchCriteriaId": "46FF39C5-CC37-4573-BB18-36254D38509B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eo:*:*:*:*:*:*:*",
"matchCriteriaId": "C1AF45D8-A32A-482F-8183-F0DC3C4FB5DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1eu:*:*:*:*:*:*:*",
"matchCriteriaId": "B377A8B9-90F2-41B7-9098-5ABEB621E2E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ev:*:*:*:*:*:*:*",
"matchCriteriaId": "896A71EC-9508-406F-8DE8-58953D9A30FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ew:*:*:*:*:*:*:*",
"matchCriteriaId": "E2B15FCC-1BB3-41CA-9550-6D55DD381F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ex:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A85892-C3AB-4920-A949-A71BD0332D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ey:*:*:*:*:*:*:*",
"matchCriteriaId": "C6330829-9A7B-479D-B38B-BC64148EC172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9F1E38-3482-4EAC-8654-EBC004B9344B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ga:*:*:*:*:*:*:*",
"matchCriteriaId": "51BCD9C9-7E6B-42EB-A645-32B3C00CDDEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1gb:*:*:*:*:*:*:*",
"matchCriteriaId": "34A61768-E18E-4DB0-9EDF-2E36D0F62DF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1m:*:*:*:*:*:*:*",
"matchCriteriaId": "E6B13CDA-C376-412A-AF5D-8FC25C74A0A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "4EEFAB2C-172F-45AE-9C84-A036AD22B5EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1sec:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3EFB16-B62B-4D24-B99F-AED2CD35C28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "752C3C6B-910D-4153-A162-DF255F60306B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1x\\(l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B11A6E0-36BB-44C5-893C-59AC283E515B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xa:*:*:*:*:*:*:*",
"matchCriteriaId": "C1BBE2FF-5DAE-447A-9C3D-3F48B24AECA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xb:*:*:*:*:*:*:*",
"matchCriteriaId": "297FAD97-60C0-473D-A18D-03657B81B7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xc:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD4A33B-B13E-40C6-B47F-A406ACC6664F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xd:*:*:*:*:*:*:*",
"matchCriteriaId": "0E488E6E-87F0-4292-B97B-31087FDB4655",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xe:*:*:*:*:*:*:*",
"matchCriteriaId": "0D199CB1-A2A3-4678-9503-C5B61281755C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xf:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D743DF-838A-4E7A-A4FC-BB5EB7D93CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xg:*:*:*:*:*:*:*",
"matchCriteriaId": "19952DC6-1186-4754-BB1E-BA1D78A19C96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xh:*:*:*:*:*:*:*",
"matchCriteriaId": "441CB9D6-5EDB-457B-B59E-D48B01AEAF5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xi:*:*:*:*:*:*:*",
"matchCriteriaId": "28097F62-B51F-4A3B-BB31-6FA67E8C8B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xj:*:*:*:*:*:*:*",
"matchCriteriaId": "80E8AF76-0A1D-4BAE-BF10-D63080352E6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xk:*:*:*:*:*:*:*",
"matchCriteriaId": "8A11AF3F-C82F-4431-9CF1-84FDAD388D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xl:*:*:*:*:*:*:*",
"matchCriteriaId": "3B674647-4438-4450-9DCA-25184D4E2682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xm:*:*:*:*:*:*:*",
"matchCriteriaId": "86E5CC41-1344-4A65-A653-8012ACE2CF2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xp:*:*:*:*:*:*:*",
"matchCriteriaId": "71FB7128-CF11-4903-97D7-418403A03CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xq:*:*:*:*:*:*:*",
"matchCriteriaId": "63EFB20A-78E2-4BA1-B87C-BB74E8982D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xr:*:*:*:*:*:*:*",
"matchCriteriaId": "3A273401-9394-4BC3-879C-DE3EFC09B3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xs:*:*:*:*:*:*:*",
"matchCriteriaId": "6DABF911-FCDF-4095-A95D-4BB73628FCA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xt:*:*:*:*:*:*:*",
"matchCriteriaId": "77886493-C30E-439E-BBB4-3D34A8938378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xu:*:*:*:*:*:*:*",
"matchCriteriaId": "7813F511-CF6D-487F-9D1C-7A6CF85AD724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xv:*:*:*:*:*:*:*",
"matchCriteriaId": "677DC4B6-8B3D-4A0D-9934-743FD7494DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xw:*:*:*:*:*:*:*",
"matchCriteriaId": "E272881F-0804-4190-A21D-3D0B9A774F13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xx:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B39FE-3E7B-4D96-8CD4-0D57C50A786A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xy:*:*:*:*:*:*:*",
"matchCriteriaId": "F084DA16-24CB-41D1-92B7-C6E0499AAD10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1xz:*:*:*:*:*:*:*",
"matchCriteriaId": "BA979D75-F60E-45F8-B99C-1402DC8CFCDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"matchCriteriaId": "194F0AB1-92E6-4CE3-A5A1-904BF75F05D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yb:*:*:*:*:*:*:*",
"matchCriteriaId": "884753D4-3AF0-4723-9D51-26BA7B4CA533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF3601D-DF44-4A10-A424-8E97C65A36A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38BD6C-9823-4D2A-8BE2-60AABE3C4932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1ye:*:*:*:*:*:*:*",
"matchCriteriaId": "C1835410-77EB-46F2-ACF0-379759D4B0D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yf:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB103ED-B170-4193-84CD-4C59F4D6A10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yh:*:*:*:*:*:*:*",
"matchCriteriaId": "F88DCCDE-6A81-473F-B4FE-95A84F8DF964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yi:*:*:*:*:*:*:*",
"matchCriteriaId": "63D55886-268F-4E4D-B00F-8A5D97A73BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1yj:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7C6FB8-8393-4916-BB2B-3097B1995C23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C798B993-8521-4C5D-88AF-2D509DBAC2AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "127BD97D-56A0-4B75-9A19-CC499965B53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1D6AEB-26F3-4BD9-A4CA-3D54CCF158F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87B35652-621F-48DB-84FF-E214D42AA799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E216416-E3ED-437D-A725-2297DD86EF3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8F3444-17E3-48A5-BEC1-97967F7E4EA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "539E369A-299B-4CDE-940F-C853E08439B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "39120E68-F456-4035-8B28-64943CDDCFD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "57F6EF3B-2F31-4449-9B2A-9114D41BBC6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E6D907-4B38-4046-BF4F-C7DFA36F55E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6D0B52CA-3834-4435-A3E1-9684A41E6405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5976253B-339F-49C3-A538-653901E85EFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "838C42B4-6D72-4EE5-A0F0-87E60D73A44A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EB06F1BF-E186-48EA-BAE2-1B76DB16BC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECECC55-C937-45B7-ABC9-1DA44D1DBED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "23AD1406-D2E4-4517-BF3E-A87C1FA8AC7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D203439-1A4B-4805-8A15-5A33C612A5B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DC46EA-C766-4EBA-B686-29B3B23F0155",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "71A41531-FBC0-41DD-9965-8CAFA30488AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "310BA9E3-8175-4220-9FC3-48390C994174",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B837418-4855-44BE-BA6F-0840864481A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "C5A13401-2660-483E-89A5-6420B5866BB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5F84EF-1C19-4AB3-BD01-A3DE47B2A46A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "77FC74E2-2510-40F5-BB2B-11608B844E28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7E021FDA-0D92-4A81-8721-EED507426922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "3C69E845-700C-4250-B528-9482A5362F61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "389D6E60-F6AB-40B8-B894-CE97BF13AE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "1A40EA0A-1642-4950-9943-20C1888C18D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.00.xo.15.0\\(2\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F018C7-4BC5-443E-815E-481C805F3612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "621845E0-E885-46E4-929D-55DBE43DC97F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "86C0900A-1354-4A20-B5ED-8C005BCE4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0xo:*:*:*:*:*:*:*",
"matchCriteriaId": "E6256C79-DBDA-4ED7-AA3B-DE78B8C387B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "429F3E17-5C65-4C91-8881-AAEAA00BCD44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "F47E76FF-DE36-463D-B610-A99C90AF7B91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3104D911-5FFC-4605-B234-6FD40A206DC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EC787C70-6540-4AF7-9F05-8FD86284091E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FC716D3D-5C37-4E36-8F6B-53801DC7225E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "BEF8A6EC-3C45-4CDB-81B5-4D50CD5C4087",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "737D7668-872C-4246-9AB9-12FF059E231A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CBDA4F-DBB3-4426-8C16-2B2314ACF21D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "41E237F6-97DA-45AE-8505-B3F629AB026D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "B45225F2-C9EB-493D-B845-64BFB8DBB89B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "252377A3-7F15-45F2-A169-BBC37858D4DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "02E8F96A-EA9C-4E66-8491-9B2A3A4023F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "85908754-8426-49D3-BCC2-AF174B5D0EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3s:*:*:*:*:*:*:*",
"matchCriteriaId": "7F5BA973-D59A-4CB9-BC35-089F88737425",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "5E6E83FC-CFAE-45EA-9F20-830FC5E97399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5s:*:*:*:*:*:*:*",
"matchCriteriaId": "D1B3BCAC-8317-41C4-9A60-85B693818044",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.xs:*:*:*:*:*:*:*",
"matchCriteriaId": "B7D36DA8-0CBC-424F-80FB-A59839C49FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "5872A42F-745E-4EC6-8679-C28F79F6621C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "86947E54-A1B9-4ECE-92A6-417462249612",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "C910BE7C-517F-4E41-8433-1858F700AA22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.xs:*:*:*:*:*:*:*",
"matchCriteriaId": "A862D914-CE60-48A9-9D52-299642BE3FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB5A06F-59B5-43A1-8D06-1B6BA08630A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5F6C44-DB9D-41FD-AD8D-AF45258772DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "0D9E07C9-4C98-48A3-ACF9-1C6FE834D19C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "E979597C-E614-45E9-9AC4-66DE323221BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "55E908D0-7327-42B7-81C0-FA25BF45929C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0s:*:*:*:*:*:*:*",
"matchCriteriaId": "94227B25-5C86-453C-9DC8-A8201C1D1FEE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "891B8FA4-B602-42C5-A94F-8C60BBF7A7D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "856917BD-179B-4C43-8EA6-034254720B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "800D4D6A-0814-4D83-8E66-945687AE58D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0810F1FB-120C-4F4C-A9A7-6AA76227A4AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F50FA336-1365-4449-86B6-855C06E4F516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3CBF542E-2454-4F54-93F6-8D003E06F9D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F4A7CB-C68C-4796-A853-0BD58C9FF208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "643454AD-ADE5-4917-A7B0-AA3A2AF55265",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B009CCE4-908C-4830-B0E0-7B4CB33280F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "640CDC78-22D3-4E60-8D36-F088D8DB27DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20DD5D7A-5AF6-4847-A001-926B13FB8B26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:8.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "11E26250-8C97-4875-AECA-592DEC341C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67EB8598-8447-4CCC-A7F5-C509B42CD672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "67A346E4-B5E7-49E1-8756-0610917D9082",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:fwsm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1651BB28-E030-4AEC-AD5F-7A51C28DF22A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:staros:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EDFAD5B5-F326-4466-8DA6-7D199B2B2175",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795."
},
{
"lang": "es",
"value": "La implementaci\u00f3n OSFPF en Cisco IOS v12.0 hasta la v 12.4 y v15.0 hasta v15.3, IOS-XE v2.x hasta la v3.9.xS, ASA y PIX 7.x hasta la v9.1, FWSM, NX-OS, y StarOS anterior a v14.0.50488 no valida correctamente los paquetes Link State Advertisement (LSA) tipo 1 antes de realizar operaciones en la base de datos LSA, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (interrupci\u00f3n del enrutamiento) u obtener informaci\u00f3n sensible a trav\u00e9s de un paquete (1) unicast o (2) un paquete de multidifusi\u00f3n, tambi\u00e9n conocido como Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, y CSCug39795."
}
],
"id": "CVE-2013-0149",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-08-05T13:22:47.847",
"references": [
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/229804"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/229804"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-0028
Vulnerability from fkie_nvd - Published: 2008-01-23 21:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | adaptive_security_appliance_software | * | |
| cisco | adaptive_security_appliance_software | 8.0\(3\) | |
| cisco | pix_firewall_software | * | |
| cisco | pix_firewall_software | 8.0\(3\) | |
| cisco | 5500_series_adaptive_security_appliance | - | |
| cisco | pix_500 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324140A9-53BA-439E-A748-676584CE24A1",
"versionEndExcluding": "7.2\\(3\\)6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "31E7CB8A-17DF-43EB-9BCB-F2E5293C949F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "76D9DFF9-699B-4124-842F-6B8655F19D6A",
"versionEndExcluding": "7.2\\(3\\)6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:8.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "40F5356F-4EA4-463A-A3E3-DD2A7252ACB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE9B5E72-D461-4CB6-9F78-E0B23981ACD9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:pix_500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0B01EA-ECFF-4D57-9A68-4265A9821F39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet."
},
{
"lang": "es",
"value": "Hay una vulnerabilidad no especificada en PIX 500 Series Security Appliance y 5500 Series Adaptive Security Appliance (ASA) de Cisco anterior a las versiones 7.2 (3) 6 y 8.0 (3), cuando la funci\u00f3n de decremento de Time-to-Live (TTL) est\u00e1 habilitada, permite que los atacantes remotos causen una denegaci\u00f3n de servicio (recarga del dispositivo) por medio de un paquete IP creado."
}
],
"id": "CVE-2008-0028",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-01-23T21:00:00.000",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/28625"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/27418"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019262"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019263"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/28625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/27418"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019262"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1019263"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-0959
Vulnerability from fkie_nvd - Published: 2007-02-16 00:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asa_5500 | 7.2\(2\) | |
| cisco | pix_firewall_software | 7.2\(2\) |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EFDDB4A3-FB2C-48B2-9735-307D82084BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "02588BF1-A105-4354-B229-B130840074A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets."
},
{
"lang": "es",
"value": "Cisco PIX 500 y ASA 5500 Series Security Appliances 7.2.2, cuando se configuran para inspeccionar protocolos concretos basados en TCP, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) mediante paquetes TCP mal-formados."
}
],
"id": "CVE-2007-0959",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-16T00:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33062"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "cve@mitre.org",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-0962
Vulnerability from fkie_nvd - Published: 2007-02-16 00:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | firewall_services_module | 2.3 | |
| cisco | firewall_services_module | 3.1 | |
| cisco | asa_5500 | 7.0 | |
| cisco | asa_5500 | 7.1 | |
| cisco | pix_firewall_software | 7.0 | |
| cisco | pix_firewall_software | 7.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:firewall_services_module:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E9A8528D-DF6A-4493-A77E-CBF08359F2E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:firewall_services_module:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F90E9070-781D-4D3D-98EB-5B6DB9D3C75E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "891B8FA4-B602-42C5-A94F-8C60BBF7A7D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "856917BD-179B-4C43-8EA6-034254720B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B009CCE4-908C-4830-B0E0-7B4CB33280F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "640CDC78-22D3-4E60-8D36-F088D8DB27DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic."
},
{
"lang": "es",
"value": "Cisco PIX 500 y ASA 5500 Series Security Appliances 7.x versiones anteriores a 7.0(4.14), 7.1 versiones anteriores a 7.1(2.1), y el FWSM 2.x versiones anteriores a 2.3(4.12) y 3.x versiones anteriores a 3.1(3.24), cuando \"inspect http\" est\u00e1 habilitado, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) mediante tr\u00e1fico HTTP mal-formado."
}
],
"id": "CVE-2007-0962",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-16T00:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33055"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24180"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-0960
Vulnerability from fkie_nvd - Published: 2007-02-16 00:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asa_5500 | 7.2\(2\) | |
| cisco | pix_firewall_software | 7.2\(2\) |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EFDDB4A3-FB2C-48B2-9735-307D82084BAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "02588BF1-A105-4354-B229-B130840074A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Cisco PIX 500 y ASA 5500 Series Security Appliances 7.2.2, cuando se configuran para usar el m\u00e9todo de autenticaci\u00f3n LOCAL, permite a usuarios remotos autenticados obtener privilegios mediante vectores desconocidos."
}
],
"id": "CVE-2007-0960",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-16T00:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33063"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24179"
},
{
"source": "cve@mitre.org",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2007-0961
Vulnerability from fkie_nvd - Published: 2007-02-16 00:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | asa_5500 | 6.3 | |
| cisco | asa_5500 | 7.0 | |
| cisco | asa_5500 | 7.1 | |
| cisco | asa_5500 | 7.2 | |
| cisco | pix_firewall_software | 6.3 | |
| cisco | pix_firewall_software | 7.0 | |
| cisco | pix_firewall_software | 7.1 | |
| cisco | pix_firewall_software | 7.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asa_5500:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF9E603-AACA-471C-AD21-617F2C93A9C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "891B8FA4-B602-42C5-A94F-8C60BBF7A7D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "856917BD-179B-4C43-8EA6-034254720B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:asa_5500:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "800D4D6A-0814-4D83-8E66-945687AE58D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B009CCE4-908C-4830-B0E0-7B4CB33280F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "640CDC78-22D3-4E60-8D36-F088D8DB27DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "20DD5D7A-5AF6-4847-A001-926B13FB8B26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the \"inspect sip\" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets."
},
{
"lang": "es",
"value": "Cisco PIX 500 y ASA 5500 Series Security Appliances 6.x versiones anteriores a 6.3(5.115), 7.0 versiones anteriores a 7.0(5.2), y 7.1 versiones anteriores a 7.1(2.5), y el FWSM 3.x versiones anteriores a 3.1(3.24), cuando la opci\u00f3n \"inspect sip\" est\u00e1 habilitada, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio de dispositivo) mediante paquetes SIP mal-formados."
}
],
"id": "CVE-2007-0961",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-02-16T00:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/33054"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/24179"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24180"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/33054"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24160"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/24179"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/24180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-4312
Vulnerability from fkie_nvd - Published: 2006-08-23 22:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | pix_firewall_501 | * | |
| cisco | pix_firewall_506 | * | |
| cisco | pix_firewall_515 | * | |
| cisco | pix_firewall_515e | * | |
| cisco | pix_firewall_520 | * | |
| cisco | pix_firewall_525 | * | |
| cisco | pix_firewall_535 | * | |
| cisco | pix_firewall_software | 6.3 | |
| cisco | adaptive_security_appliance | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*",
"matchCriteriaId": "151D5A44-2D0D-478A-B011-A0892817B814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "286199EA-71CF-46B4-9131-F1752C2EA82D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D80DB80-F243-469B-993F-E368B092B3C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
},
{
"lang": "es",
"value": "Cisco PIX 500 Series Security Appliances y ASA 5500 Series Adaptive Security Appliances, cuando ejecutan 7.0(x) hasta 7.0(5) y 7.1(x) hasta 7.1(2.4), y el Firewall Services Module (FWSM) 3.1(x) hasta 3.1(1.6), provoca que la contrase\u00f1a EXEC, las contrase\u00f1as de usuario local, y la contrase\u00f1a de activaci\u00f3n se cambien a un \"valor no aleatorio\" bajo determinadas circunstancias, lo que provoca un bloqueo a los administradores y podr\u00eda permitir a los atacantes obtener acceso."
}
],
"id": "CVE-2006-4312",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.1,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-08-23T22:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/21616"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016738"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016739"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016740"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/28143"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/19681"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/21616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016738"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016739"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016740"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/28143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/19681"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-4194
Vulnerability from fkie_nvd - Published: 2006-08-17 01:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | pix_firewall_501 | * | |
| cisco | pix_firewall_506 | * | |
| cisco | pix_firewall_515 | * | |
| cisco | pix_firewall_515e | * | |
| cisco | pix_firewall_520 | * | |
| cisco | pix_firewall_525 | * | |
| cisco | pix_firewall_535 | * | |
| cisco | pix_firewall_software | 6.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*",
"matchCriteriaId": "151D5A44-2D0D-478A-B011-A0892817B814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "286199EA-71CF-46B4-9131-F1752C2EA82D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue"
},
{
"lang": "es",
"value": "** IMPUGNADA ** Vulnerabilidad no especificada en Cisco PIX 500 Series Security Appliances permite a atacantes remotos enviar paquetes UDP de su elecci\u00f3n a dispositivos de la intranet mediante vectores no especificados relacionados con comandos de establecimiento del Protocolo de Iniciaci\u00f3n de Sesi\u00f3n (Session Initiation Protocol o SIP), un problema distinto de CVE-2006-4032. NOTA: el fabricante, tras trabajar con el investigador, ha sido incapaz de reproducir el problema."
}
],
"id": "CVE-2006-4194",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-08-17T01:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://searchsecurity.techtarget.com/originalContent/0%2C289142%2Csid14_gci1207450%2C00.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"source": "cve@mitre.org",
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/29781"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/19536"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://searchsecurity.techtarget.com/originalContent/0%2C289142%2Csid14_gci1207450%2C00.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/29781"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/19536"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2006-3906
Vulnerability from fkie_nvd - Published: 2006-07-27 22:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5802E2D8-7069-474C-826F-AEE7B50BFE34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:vpn_3001_concentrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "786346D5-13D8-45C9-B91D-C2AACF675377",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:vpn_3015_concentrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A512328-2FD0-4B1D-9327-A13A0BCE9C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:vpn_3020_concentrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D50FE2-A4E6-4EF4-A91C-88FB0AF6CCB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:vpn_3030_concentator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6548F964-B8EE-4B39-87CF-99743D41C42C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:vpn_3060_concentrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E08810E6-33B6-45FF-91C7-EED10DC023EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:vpn_3080_concentrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD1A1AC-980F-428E-8BAF-0FC821014868",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED2D96-5CC9-4851-986A-C9ED5E2D96CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AC150564-7413-401A-9DD8-8AD773F1D8F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0714F9E-75AD-4405-BBC3-E0D817C05EF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EA0DDDD-C987-4DA6-ADEE-77B387C26A92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49696766-ECCE-4903-AA54-271EFEA58B8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D1557499-D1A1-4A26-80DA-A3D66AA53580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "923949D1-06EC-462F-A3BC-FCAB448042A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.a:*:*:*:*:*:*:*",
"matchCriteriaId": "901B1838-7169-41E5-80EF-29BB680BF937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.b:*:*:*:*:*:*:*",
"matchCriteriaId": "CDAEAA5F-0A98-48B7-8012-9B9909243135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.c:*:*:*:*:*:*:*",
"matchCriteriaId": "11DA4B03-2D30-4514-9DF5-5F0DDD4B8DC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.d:*:*:*:*:*:*:*",
"matchCriteriaId": "CB38834B-E4AB-43F4-888B-14B088C95594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:2.5.2.f:*:*:*:*:*:*:*",
"matchCriteriaId": "23F8059B-3968-4D63-B1B3-74E545C918D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "701CDA0D-F932-4251-B484-8F20F0AE9003",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.a:*:*:*:*:*:*:*",
"matchCriteriaId": "E674AA43-905E-40E0-A70F-77D05C62C18D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.3.b:*:*:*:*:*:*:*",
"matchCriteriaId": "3F0D767F-7142-46D2-B3E4-7FE8E9E3285A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "057A6BA0-5F5E-4FC4-B2EC-A17968EAC2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "645AB682-2965-4C8D-B323-AB510E424407",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1\\(rel\\):*:*:*:*:*:*:*",
"matchCriteriaId": "76F7F019-A0A4-49CD-BB28-24BF7725AC89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "175CD875-3402-4B06-A3FA-7DFFCBB44056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AF61B8A5-31E7-40F5-8B3D-CA90E50618AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4C9017BB-5848-4361-ABB9-C69FB3AB90FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5\\(rel\\):*:*:*:*:*:*:*",
"matchCriteriaId": "207034E8-35F7-4E78-A3FC-C86D20EB8D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C544E523-15E5-4CE5-8113-53454F5D9973",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B09F6EBD-C3FC-4680-BE31-A766D863237D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8C3FDA-D321-4202-A8EA-6C1464558A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B68705AB-A133-401F-9F41-64594E071816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F9092680-E154-4EAB-A2D5-B692073F894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8EF5F3FA-5FA4-408E-BA62-3943C5DFD859",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ADFC9764-5BF5-449F-9200-5569C13F8309",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F12F2AAC-DB5B-4C28-86C5-F59490362E54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "071F52AD-D59B-4673-BCBE-112B94D3EB66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "80709CB0-D386-4C4F-B3EE-7A0501FD7248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.a:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AFAF42-B894-4D62-A9CF-3349A43191AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.b:*:*:*:*:*:*:*",
"matchCriteriaId": "ABE5BB7F-D8B4-441B-9F45-56F622EEAA52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.c:*:*:*:*:*:*:*",
"matchCriteriaId": "8B87A7EC-DC23-4075-8C4A-2317FF34BDB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.d:*:*:*:*:*:*:*",
"matchCriteriaId": "98AC18E3-D12B-489D-9D95-6C9210235FB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7.f:*:*:*:*:*:*:*",
"matchCriteriaId": "E9DB969E-8BE9-46E0-B8AA-5057E320F1ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:3.6.7d:*:*:*:*:*:*:*",
"matchCriteriaId": "36291ADE-3D5A-4E49-8BA7-B71CAAA226B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D953DA9F-B54E-4941-85BE-48933C98DB55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "12E298AD-26AC-4E1D-83D8-5C2016CC6559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "590283B1-4965-44D3-A0D4-CD90DD6B2D2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.0.5.b:*:*:*:*:*:*:*",
"matchCriteriaId": "B71DAF71-5763-44D8-AD1E-5ADE8BC15120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B35B6FA9-E504-4CE3-B171-815291A812CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.5.b:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA54782-93A8-47BE-863D-89CA3678BF6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.a:*:*:*:*:*:*:*",
"matchCriteriaId": "67F66A10-246D-447B-941F-F1175684F0D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.b:*:*:*:*:*:*:*",
"matchCriteriaId": "82435757-D892-4298-9176-5EC1FEC93037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.1.7.l:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BAFC4A-D8FB-4450-BC29-83B306000C99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D03F5D3F-6FB1-4A25-B544-D3C973F35DD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7\\(rel\\):*:*:*:*:*:*:*",
"matchCriteriaId": "432A18AD-A495-4750-85A5-7D82FC321D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5A90348C-94E2-4F04-A887-E7EFFC1ACF12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.1.f:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5E136E-9215-46A8-A40A-AE964C588A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C9729CAA-8041-43D6-9299-07CCCBFD3907",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2.a:*:*:*:*:*:*:*",
"matchCriteriaId": "45A33500-B013-4863-BF12-27283ACD4AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3000_concentrator_series_software:4.7.2.f:*:*:*:*:*:*:*",
"matchCriteriaId": "A13F7BC2-7491-4266-9B32-3E6D8978A6C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3005_concentrator_software:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17196F00-9D7A-4AF6-AE1E-EA2E450A8ABD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7\\(rel\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A459B6C2-EE91-43AE-A837-BCF4188BEB40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32200DE2-71BA-417C-AF24-3BE549A68711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.1.f:*:*:*:*:*:*:*",
"matchCriteriaId": "25F3F37E-4BBD-4A0E-A1DF-64602D75207D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0722179-9602-42A1-81CA-062D4010B9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2.a:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0E5615-4855-4A35-BE58-B9B27C7B2CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:vpn_3030_concentator:4.7.2.f:*:*:*:*:*:*:*",
"matchCriteriaId": "65D48968-68F5-49BD-88CF-6C8D73D7F967",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cisco:pix_asa_ids:*:*:*:*:*:*:*:*",
"matchCriteriaId": "701810DC-0A46-4D01-90BD-03AAF277E4DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:pix_firewall:6.2.2_.111:*:*:*:*:*:*:*",
"matchCriteriaId": "ECBC761F-A8F5-4CD8-B19C-5CE8FFC58FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:pix_firewall:6.2.3_\\(110\\):*:*:*:*:*:*:*",
"matchCriteriaId": "900DC321-4CEF-4810-8247-B82FE93F48BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:pix_firewall:6.3.3_\\(133\\):*:*:*:*:*:*:*",
"matchCriteriaId": "422F8E64-2376-4E82-A1A2-916BFB7172AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cisco:pix_firewall:6.3.5_\\(112\\):*:*:*:*:*:*:*",
"matchCriteriaId": "54389797-86AA-4744-AA84-9B66FB6E01E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_501:*:*:*:*:*:*:*:*",
"matchCriteriaId": "151D5A44-2D0D-478A-B011-A0892817B814",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_506:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E346F334-9BA3-4BDC-8D0F-D749A7D76E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EE5C14-F556-48A5-BB3F-5465DC823B85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_515e:*:*:*:*:*:*:*:*",
"matchCriteriaId": "286199EA-71CF-46B4-9131-F1752C2EA82D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_520:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32E437F4-1B19-4B57-9EAD-3AC04717E389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_525:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29B2019F-DF6E-4924-B0D2-37094B5265F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:pix_firewall_535:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9600B7CF-4AEB-4319-8EF4-4FEA40EF6367",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:cisco:secure_pix_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "507B3A76-3F01-4BF0-8A3B-9E620DCB082D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "026A2C0D-AD93-49DC-AF72-8C12AD565B2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "920FAF7C-2964-497B-B1F8-3B060AAB4C55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2D499F38-A34C-44D0-A061-C3AE08CF178B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "63E564B5-A39F-4837-93B8-1331CD975D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1EEDB9DD-C862-4783-9F96-88836424B298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3BD36C4A-4B90-4012-B4A5-6081C413E302",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C39A993C-5A36-4D3F-B8B6-9B3252713127",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B1C4F7D5-DCD0-409C-86BF-A96A5253DF64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8198D129-76D0-4983-BFC4-8EC724FE1B6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6BEECFAA-9DD5-4950-B9F1-CF8582225314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "49566EAC-05AF-4880-8000-351AF538E4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "23E9FBEE-3213-47FA-8CBA-C285533265FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.4\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "118CBF59-DAD8-468E-B279-F6359E4624F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.4\\(7.202\\):*:*:*:*:*:*:*",
"matchCriteriaId": "957E6F8F-6881-44DE-A687-9D1E0C13F6CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:4.4\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E56328FE-F499-4325-AFEC-45BFEAB7662D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7AA2E425-904C-4070-8F5F-B81BCF3147F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "604CF950-5D4B-4DC6-819E-0528B22CB05C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E12887E5-A2BB-4B1E-9621-2961458BCE21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.1\\(4.206\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3B5BE2F7-687C-477B-818B-A102526DF36D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "999A0969-60EB-4B2E-A274-9F05D9F840E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "626E41D2-A5EF-493D-9486-3D9BC3793EAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EBA31E4D-2215-4E4A-BCCC-B3D922CB752D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(3.210\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4F16AD2C-1CC1-43D9-A944-F67071B62E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A42FFBF7-9ADB-4F14-BED8-F2E53BEE7B62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(6\\):*:*:*:*:*:*:*",
"matchCriteriaId": "25D16481-CA9A-4B4D-AC9D-3A4F0387FF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "56E4588E-6C1F-4720-8082-0EF299435CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.2\\(9\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D24E0E92-59D7-4B16-8B0D-2FD0EE821D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "ED24C763-7558-4AC0-AE10-FDA3D3078D27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4CC85ED3-B598-4A87-A2B8-8D3B52ECC2F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(1.200\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C84CE24E-4ED6-43D0-A234-FBD24D22A8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF84B9FE-7C6C-4578-A5A9-EF0D5EEEEC19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:5.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "72C3E2B4-3A36-44B5-90D3-1BF9FAD98579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "58BE9C02-2A01-4F6F-A6BD-BC0173561E9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C558CED8-8342-46CB-9F52-580B626D320E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0F85D19E-6C26-429D-B876-F34238B9DAAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FEC7CCF7-CBC6-4EDC-8EDD-884DFFFBCC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E5011A33-CD6D-4EFC-ACFD-E51C9AE726A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.0\\(4.101\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09063867-0E64-4630-B35B-4CCA348E4DAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78F98CD7-A352-483C-9968-8FB2627A7CBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F97FE485-705F-4707-B6C6-0EF9E8A85D5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E2B925E8-D2C2-4E8C-AC21-0C422245C482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9170562-872E-4C32-869C-B10FF35A925E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(4\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0927A68-8BB2-4F03-8396-E9CACC158FC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "559DDBA3-2AF4-4A0C-B219-6779BA931F21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.1.5\\(104\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F76AED68-8304-4BC6-9D98-64231B08A6A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED9D142A-DDC8-4BD6-8C22-F242C9C0B1ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5226C9CC-6933-4F10-B426-B47782C606FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "757DAE9A-B25D-4B8A-A41B-66C2897B537E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5E3DC170-E279-4725-B9EE-6840B5685CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.2\\(3.100\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8091EDA9-BD18-47F7-8CEC-E086238647C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6F867890-74A4-4892-B99A-27DB4603B873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE05B514-F094-4632-B25B-973F976F6409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(2\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3392428D-1A85-4472-A276-C482A78E2CE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0D74D2C-662B-4D24-89EE-3DB73F96BBF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.102\\):*:*:*:*:*:*:*",
"matchCriteriaId": "40954985-16E6-4F37-B014-6A55166AE093",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(3.109\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C097809-1FEF-4417-A201-42291CC29122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:pix_firewall_software:6.3\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5E6D5FD3-CF95-4A3B-9ADB-CEC77F73CA78",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected."
},
{
"lang": "es",
"value": "Protocolo Internet Key Exchange (IKE) version 1, implementado para Cisco IOS, VPN 3000 Concentrators, y PIX firewalls, permite a atacantes remotos provocar denegaci\u00f3n de servicio (agotamiento de recursos) a trav\u00e9s de un flood de paquetes IKE Phase-1 que exceden el ratio de expiraci\u00f3n de la sesi\u00f3n. NOTA: se ha indicado que esto es debido a un dise\u00f1o debil del protocolo IKe version 1, en cuyo caso otros vendedores e implementaciones podr\u00edan verse afectados."
}
],
"id": "CVE-2006-3906",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-07-27T22:04:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/1293"
},
{
"source": "cve@mitre.org",
"url": "http://securitytracker.com/id?1016582"
},
{
"source": "cve@mitre.org",
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/29068"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/19176"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/1293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securitytracker.com/id?1016582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/29068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/19176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2016-6366 (GCVE-0-2016-6366)
Vulnerability from cvelistv5 – Published: 2016-08-18 18:00 – Updated: 2025-10-21 23:55
VLAI?
Summary
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:29:19.884Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "92521",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92521"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"name": "20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"name": "40258",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"name": "1036637",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1036637"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2016-6366",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T17:39:13.881330Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-05-24",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6366"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:55:50.638Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6366"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-05-24T00:00:00+00:00",
"value": "CVE-2016-6366 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-08-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "92521",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92521"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"name": "20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"name": "40258",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"name": "1036637",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1036637"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6366",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "92521",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92521"
},
{
"name": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip",
"refsource": "MISC",
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"name": "http://blogs.cisco.com/security/shadow-brokers",
"refsource": "CONFIRM",
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"name": "20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"name": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"name": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html",
"refsource": "MISC",
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"name": "40258",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"name": "1036637",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036637"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2016-6366",
"datePublished": "2016-08-18T18:00:00.000Z",
"dateReserved": "2016-07-26T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:55:50.638Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-0149 (GCVE-0-2013-0149)
Vulnerability from cvelistv5 – Published: 2013-08-03 01:00 – Updated: 2024-08-06 14:18
VLAI?
Summary
The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:18:09.198Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130801 OSPF LSA Manipulation Vulnerability in Multiple Cisco Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"name": "VU#229804",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/229804"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-13T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "20130801 OSPF LSA Manipulation Vulnerability in Multiple Cisco Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"name": "VU#229804",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/229804"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-0149",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130801 OSPF LSA Manipulation Vulnerability in Multiple Cisco Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"name": "VU#229804",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/229804"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2013-0149",
"datePublished": "2013-08-03T01:00:00",
"dateReserved": "2012-12-06T00:00:00",
"dateUpdated": "2024-08-06T14:18:09.198Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-0028 (GCVE-0-2008-0028)
Vulnerability from cvelistv5 – Published: 2008-01-23 20:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.285Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20080123 Cisco PIX and ASA Time-to-Live Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"name": "27418",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27418"
},
{
"name": "1019263",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019263"
},
{
"name": "1019262",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019262"
},
{
"name": "ADV-2008-0259",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"name": "28625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28625"
},
{
"name": "pix-asa-ttl-dos(39862)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20080123 Cisco PIX and ASA Time-to-Live Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"name": "27418",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27418"
},
{
"name": "1019263",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019263"
},
{
"name": "1019262",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019262"
},
{
"name": "ADV-2008-0259",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"name": "28625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28625"
},
{
"name": "pix-asa-ttl-dos(39862)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-0028",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20080123 Cisco PIX and ASA Time-to-Live Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"name": "27418",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27418"
},
{
"name": "1019263",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019263"
},
{
"name": "1019262",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019262"
},
{
"name": "ADV-2008-0259",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"name": "28625",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28625"
},
{
"name": "pix-asa-ttl-dos(39862)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-0028",
"datePublished": "2008-01-23T20:00:00",
"dateReserved": "2007-12-17T00:00:00",
"dateUpdated": "2024-08-07T07:32:23.285Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0962 (GCVE-0-2007-0962)
Vulnerability from cvelistv5 – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.308Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-http-dos(32486)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"name": "33055",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33055"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-http-dos(32486)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"name": "33055",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33055"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0962",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24180"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-http-dos(32486)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"name": "33055",
"refsource": "OSVDB",
"url": "http://osvdb.org/33055"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0962",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.308Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0959 (GCVE-0-2007-0959)
Vulnerability from cvelistv5 – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.377Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "33062",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "33062",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0959",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "33062",
"refsource": "OSVDB",
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0959",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.377Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0960 (GCVE-0-2007-0960)
Vulnerability from cvelistv5 – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.390Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "33063",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33063"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
},
{
"name": "cisco-pix-asa-local-privilege-escalation(32489)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "33063",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33063"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
},
{
"name": "cisco-pix-asa-local-privilege-escalation(32489)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "24179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "33063",
"refsource": "OSVDB",
"url": "http://osvdb.org/33063"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"name": "cisco-pix-asa-local-privilege-escalation(32489)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0960",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.390Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0961 (GCVE-0-2007-0961)
Vulnerability from cvelistv5 – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.377Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "33054",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33054"
},
{
"name": "cisco-fwsm-sip-dos(32501)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "VU#430969",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-sip-dos(32487)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the \"inspect sip\" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "33054",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33054"
},
{
"name": "cisco-fwsm-sip-dos(32501)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "VU#430969",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-sip-dos(32487)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0961",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the \"inspect sip\" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24180"
},
{
"name": "33054",
"refsource": "OSVDB",
"url": "http://osvdb.org/33054"
},
{
"name": "cisco-fwsm-sip-dos(32501)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "VU#430969",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "24179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-sip-dos(32487)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0961",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.377Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4312 (GCVE-0-2006-4312)
Vulnerability from cvelistv5 – Published: 2006-08-23 22:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:06:07.253Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-3367",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21616"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-3367",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21616"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4312",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-3367",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21616"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4312",
"datePublished": "2006-08-23T22:00:00",
"dateReserved": "2006-08-23T00:00:00",
"dateUpdated": "2024-08-07T19:06:07.253Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4194 (GCVE-0-2006-4194)
Vulnerability from cvelistv5 – Published: 2006-08-17 01:00 – Updated: 2024-08-07 18:57
VLAI?
Summary
Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:57:46.244Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19536",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19536"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://searchsecurity.techtarget.com/originalContent/0%2C289142%2Csid14_gci1207450%2C00.html"
},
{
"name": "29781",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/29781"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"name": "20060815 Unconfirmed SIP Inspection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-08-23T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19536",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19536"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://searchsecurity.techtarget.com/originalContent/0%2C289142%2Csid14_gci1207450%2C00.html"
},
{
"name": "29781",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/29781"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"name": "20060815 Unconfirmed SIP Inspection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4194",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19536",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19536"
},
{
"name": "http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1207450,00.html",
"refsource": "MISC",
"url": "http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1207450,00.html"
},
{
"name": "29781",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29781"
},
{
"name": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/",
"refsource": "MISC",
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"name": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5",
"refsource": "MISC",
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"name": "20060815 Unconfirmed SIP Inspection Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4194",
"datePublished": "2006-08-17T01:00:00",
"dateReserved": "2006-08-16T00:00:00",
"dateUpdated": "2024-08-07T18:57:46.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3906 (GCVE-0-2006-3906)
Vulnerability from cvelistv5 – Published: 2006-07-27 22:00 – Updated: 2024-08-07 18:48
VLAI?
Summary
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:48:39.430Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"name": "19176",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19176"
},
{
"name": "20060726 Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"name": "29068",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/29068"
},
{
"name": "20060728 Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"name": "oval:org.mitre.oval:def:5299",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"name": "1016582",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016582"
},
{
"name": "1293",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1293"
},
{
"name": "20060726 Internet Key Exchange Resource Exhaustion Attack",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"name": "cisco-ike-resource-exhaustion-dos(27972)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"name": "19176",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19176"
},
{
"name": "20060726 Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"name": "29068",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/29068"
},
{
"name": "20060728 Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"name": "oval:org.mitre.oval:def:5299",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"name": "1016582",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016582"
},
{
"name": "1293",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1293"
},
{
"name": "20060726 Internet Key Exchange Resource Exhaustion Attack",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"name": "cisco-ike-resource-exhaustion-dos(27972)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3906",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html",
"refsource": "MISC",
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"name": "19176",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19176"
},
{
"name": "20060726 Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"name": "29068",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29068"
},
{
"name": "20060728 Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"name": "oval:org.mitre.oval:def:5299",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"name": "1016582",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016582"
},
{
"name": "1293",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1293"
},
{
"name": "20060726 Internet Key Exchange Resource Exhaustion Attack",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"name": "cisco-ike-resource-exhaustion-dos(27972)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3906",
"datePublished": "2006-07-27T22:00:00",
"dateReserved": "2006-07-27T00:00:00",
"dateUpdated": "2024-08-07T18:48:39.430Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2016-6366 (GCVE-0-2016-6366)
Vulnerability from nvd – Published: 2016-08-18 18:00 – Updated: 2025-10-21 23:55
VLAI?
Summary
Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T01:29:19.884Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "92521",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/92521"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"name": "20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"name": "40258",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"name": "1036637",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1036637"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2016-6366",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T17:39:13.881330Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-05-24",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6366"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:55:50.638Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-6366"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-05-24T00:00:00+00:00",
"value": "CVE-2016-6366 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2016-08-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T20:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "92521",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/92521"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"name": "20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"name": "40258",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"name": "1036637",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1036637"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2016-6366",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in Cisco Adaptive Security Appliance (ASA) Software through 9.4.2.3 on ASA 5500, ASA 5500-X, ASA Services Module, ASA 1000V, ASAv, Firepower 9300 ASA Security Module, PIX, and FWSM devices allows remote authenticated users to execute arbitrary code via crafted IPv4 SNMP packets, aka Bug ID CSCva92151 or EXTRABACON."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "92521",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/92521"
},
{
"name": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip",
"refsource": "MISC",
"url": "https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40258.zip"
},
{
"name": "http://blogs.cisco.com/security/shadow-brokers",
"refsource": "CONFIRM",
"url": "http://blogs.cisco.com/security/shadow-brokers"
},
{
"name": "20160817 Cisco Adaptive Security Appliance SNMP Remote Code Execution Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-asa-snmp"
},
{
"name": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516",
"refsource": "CONFIRM",
"url": "http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-56516"
},
{
"name": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html",
"refsource": "MISC",
"url": "https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html"
},
{
"name": "40258",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40258/"
},
{
"name": "1036637",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1036637"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2016-6366",
"datePublished": "2016-08-18T18:00:00.000Z",
"dateReserved": "2016-07-26T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:55:50.638Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-0149 (GCVE-0-2013-0149)
Vulnerability from nvd – Published: 2013-08-03 01:00 – Updated: 2024-08-06 14:18
VLAI?
Summary
The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:18:09.198Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130801 OSPF LSA Manipulation Vulnerability in Multiple Cisco Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"name": "VU#229804",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/229804"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-08-01T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-08-13T09:00:00",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "20130801 OSPF LSA Manipulation Vulnerability in Multiple Cisco Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"name": "VU#229804",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/229804"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-0149",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130801 OSPF LSA Manipulation Vulnerability in Multiple Cisco Products",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130801-lsaospf"
},
{
"name": "VU#229804",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/229804"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2013-0149",
"datePublished": "2013-08-03T01:00:00",
"dateReserved": "2012-12-06T00:00:00",
"dateUpdated": "2024-08-06T14:18:09.198Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-0028 (GCVE-0-2008-0028)
Vulnerability from nvd – Published: 2008-01-23 20:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:32:23.285Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20080123 Cisco PIX and ASA Time-to-Live Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"name": "27418",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/27418"
},
{
"name": "1019263",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019263"
},
{
"name": "1019262",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1019262"
},
{
"name": "ADV-2008-0259",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"name": "28625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/28625"
},
{
"name": "pix-asa-ttl-dos(39862)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-01-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20080123 Cisco PIX and ASA Time-to-Live Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"name": "27418",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/27418"
},
{
"name": "1019263",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019263"
},
{
"name": "1019262",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1019262"
},
{
"name": "ADV-2008-0259",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"name": "28625",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/28625"
},
{
"name": "pix-asa-ttl-dos(39862)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2008-0028",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliance and 5500 Series Adaptive Security Appliance (ASA) before 7.2(3)6 and 8.0(3), when the Time-to-Live (TTL) decrement feature is enabled, allows remote attackers to cause a denial of service (device reload) via a crafted IP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20080123 Cisco PIX and ASA Time-to-Live Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20080123-asa.shtml"
},
{
"name": "27418",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/27418"
},
{
"name": "1019263",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019263"
},
{
"name": "1019262",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1019262"
},
{
"name": "ADV-2008-0259",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/0259"
},
{
"name": "28625",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/28625"
},
{
"name": "pix-asa-ttl-dos(39862)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39862"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2008-0028",
"datePublished": "2008-01-23T20:00:00",
"dateReserved": "2007-12-17T00:00:00",
"dateUpdated": "2024-08-07T07:32:23.285Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0962 (GCVE-0-2007-0962)
Vulnerability from nvd – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when "inspect http" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.308Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-http-dos(32486)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"name": "33055",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33055"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-http-dos(32486)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"name": "33055",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33055"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0962",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.0 before 7.0(4.14) and 7.1 before 7.1(2.1), and the FWSM 2.x before 2.3(4.12) and 3.x before 3.1(3.24), when \"inspect http\" is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed HTTP traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24180"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-http-dos(32486)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32486"
},
{
"name": "33055",
"refsource": "OSVDB",
"url": "http://osvdb.org/33055"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0962",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.308Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0959 (GCVE-0-2007-0959)
Vulnerability from nvd – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.377Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "33062",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "33062",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0959",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to inspect certain TCP-based protocols, allows remote attackers to cause a denial of service (device reboot) via malformed TCP packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "33062",
"refsource": "OSVDB",
"url": "http://osvdb.org/33062"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "cisco-pix-asa-tcp-dos(32488)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32488"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0959",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.377Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0960 (GCVE-0-2007-0960)
Vulnerability from nvd – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.390Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "33063",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33063"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
},
{
"name": "cisco-pix-asa-local-privilege-escalation(32489)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "33063",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33063"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
},
{
"name": "cisco-pix-asa-local-privilege-escalation(32489)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0960",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Cisco PIX 500 and ASA 5500 Series Security Appliances 7.2.2, when configured to use the LOCAL authentication method, allows remote authenticated users to gain privileges via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017651"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "24179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "33063",
"refsource": "OSVDB",
"url": "http://osvdb.org/33063"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
},
{
"name": "cisco-pix-asa-local-privilege-escalation(32489)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32489"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0960",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.390Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2007-0961 (GCVE-0-2007-0961)
Vulnerability from nvd – Published: 2007-02-16 00:00 – Updated: 2024-08-07 12:34
VLAI?
Summary
Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the "inspect sip" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T12:34:21.377Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "33054",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/33054"
},
{
"name": "cisco-fwsm-sip-dos(32501)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "VU#430969",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-sip-dos(32487)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-02-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the \"inspect sip\" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2007-0608",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24180"
},
{
"name": "33054",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/33054"
},
{
"name": "cisco-fwsm-sip-dos(32501)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "VU#430969",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"name": "1017651",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "24179",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-sip-dos(32487)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"name": "22562",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1017652"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-0961",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 and ASA 5500 Series Security Appliances 6.x before 6.3(5.115), 7.0 before 7.0(5.2), and 7.1 before 7.1(2.5), and the FWSM 3.x before 3.1(3.24), when the \"inspect sip\" option is enabled, allows remote attackers to cause a denial of service (device reboot) via malformed SIP packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2007-0608",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/0608"
},
{
"name": "24180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24180"
},
{
"name": "33054",
"refsource": "OSVDB",
"url": "http://osvdb.org/33054"
},
{
"name": "cisco-fwsm-sip-dos(32501)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32501"
},
{
"name": "20070214 Multiple Vulnerabilities in Cisco PIX and ASA Appliances",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2484.shtml"
},
{
"name": "VU#430969",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/430969"
},
{
"name": "1017651",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1017651"
},
{
"name": "24179",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24179"
},
{
"name": "22561",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22561"
},
{
"name": "cisco-pix-asa-sip-dos(32487)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32487"
},
{
"name": "22562",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/22562"
},
{
"name": "24160",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/24160"
},
{
"name": "20070214 Multiple Vulnerabilities in Firewall Services Module",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a00807e2481.shtml"
},
{
"name": "1017652",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1017652"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-0961",
"datePublished": "2007-02-16T00:00:00",
"dateReserved": "2007-02-15T00:00:00",
"dateUpdated": "2024-08-07T12:34:21.377Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4312 (GCVE-0-2006-4312)
Vulnerability from nvd – Published: 2006-08-23 22:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a "non-random value" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T19:06:07.253Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2006-3367",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/21616"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-23T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-19T15:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2006-3367",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/21616"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4312",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Cisco PIX 500 Series Security Appliances and ASA 5500 Series Adaptive Security Appliances, when running 7.0(x) up to 7.0(5) and 7.1(x) up to 7.1(2.4), and Firewall Services Module (FWSM) 3.1(x) up to 3.1(1.6), causes the EXEC password, local user passwords, and the enable password to be changed to a \"non-random value\" under certain circumstances, which causes administrators to be locked out and might allow attackers to gain access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2006-3367",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2006/3367"
},
{
"name": "1016740",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016740"
},
{
"name": "20060823 Unintentional Password Modification Vulnerability in Cisco Firewall Products",
"refsource": "CISCO",
"url": "http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml"
},
{
"name": "19681",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19681"
},
{
"name": "28143",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/28143"
},
{
"name": "1016738",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016738"
},
{
"name": "1016739",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016739"
},
{
"name": "cisco-pix-password-modification(28540)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28540"
},
{
"name": "21616",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/21616"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4312",
"datePublished": "2006-08-23T22:00:00",
"dateReserved": "2006-08-23T00:00:00",
"dateUpdated": "2024-08-07T19:06:07.253Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-4194 (GCVE-0-2006-4194)
Vulnerability from nvd – Published: 2006-08-17 01:00 – Updated: 2024-08-07 18:57
VLAI?
Summary
Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:57:46.244Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "19536",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19536"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://searchsecurity.techtarget.com/originalContent/0%2C289142%2Csid14_gci1207450%2C00.html"
},
{
"name": "29781",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/29781"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"name": "20060815 Unconfirmed SIP Inspection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-08-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2006-08-23T09:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "19536",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19536"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://searchsecurity.techtarget.com/originalContent/0%2C289142%2Csid14_gci1207450%2C00.html"
},
{
"name": "29781",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/29781"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"name": "20060815 Unconfirmed SIP Inspection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-4194",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** Unspecified vulnerability in Cisco PIX 500 Series Security Appliances allows remote attackers to send arbitrary UDP packets to intranet devices via unspecified vectors involving Session Initiation Protocol (SIP) fixup commands, a different issue than CVE-2006-4032. NOTE: the vendor, after working with the researcher, has been unable to reproduce the issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "19536",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19536"
},
{
"name": "http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1207450,00.html",
"refsource": "MISC",
"url": "http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1207450,00.html"
},
{
"name": "29781",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29781"
},
{
"name": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/",
"refsource": "MISC",
"url": "http://www.idoel.smilejogja.com/2006/08/14/blinded-by-the-glare-of-facial-piercings-at-black-hat-or-the-one-that-got-away/"
},
{
"name": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5",
"refsource": "MISC",
"url": "http://www.networkworld.com/news/2006/080406-black-hat-unpatched-flaw-revealed.html?t5"
},
{
"name": "20060815 Unconfirmed SIP Inspection Vulnerability",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/tsd_products_security_response09186a008070d33b.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-4194",
"datePublished": "2006-08-17T01:00:00",
"dateReserved": "2006-08-16T00:00:00",
"dateUpdated": "2024-08-07T18:57:46.244Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2006-3906 (GCVE-0-2006-3906)
Vulnerability from nvd – Published: 2006-07-27 22:00 – Updated: 2024-08-07 18:48
VLAI?
Summary
Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T18:48:39.430Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"name": "19176",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/19176"
},
{
"name": "20060726 Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"name": "29068",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/29068"
},
{
"name": "20060728 Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"name": "oval:org.mitre.oval:def:5299",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"name": "1016582",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1016582"
},
{
"name": "1293",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/1293"
},
{
"name": "20060726 Internet Key Exchange Resource Exhaustion Attack",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"name": "cisco-ike-resource-exhaustion-dos(27972)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-07-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-17T20:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"name": "19176",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/19176"
},
{
"name": "20060726 Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"name": "29068",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/29068"
},
{
"name": "20060728 Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"name": "oval:org.mitre.oval:def:5299",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"name": "1016582",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1016582"
},
{
"name": "1293",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/1293"
},
{
"name": "20060726 Internet Key Exchange Resource Exhaustion Attack",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"name": "cisco-ike-resource-exhaustion-dos(27972)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-3906",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Key Exchange (IKE) version 1 protocol, as implemented on Cisco IOS, VPN 3000 Concentrators, and PIX firewalls, allows remote attackers to cause a denial of service (resource exhaustion) via a flood of IKE Phase-1 packets that exceed the session expiration rate. NOTE: it has been argued that this is due to a design weakness of the IKE version 1 protocol, in which case other vendors and implementations would also be affected."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html",
"refsource": "MISC",
"url": "http://www.nta-monitor.com/posts/2006/07/cisco-concentrator-dos.html"
},
{
"name": "19176",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/19176"
},
{
"name": "20060726 Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/441203/100/0/threaded"
},
{
"name": "29068",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/29068"
},
{
"name": "20060728 Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2006-07/0531.html"
},
{
"name": "oval:org.mitre.oval:def:5299",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5299"
},
{
"name": "1016582",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1016582"
},
{
"name": "1293",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/1293"
},
{
"name": "20060726 Internet Key Exchange Resource Exhaustion Attack",
"refsource": "CISCO",
"url": "http://www.cisco.com/en/US/tech/tk583/tk372/tsd_technology_security_response09186a00806f33d4.html"
},
{
"name": "cisco-ike-resource-exhaustion-dos(27972)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27972"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-3906",
"datePublished": "2006-07-27T22:00:00",
"dateReserved": "2006-07-27T00:00:00",
"dateUpdated": "2024-08-07T18:48:39.430Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}