CVE-2007-2688
Vulnerability from cvelistv5
Published
2007-05-16 01:00
Modified
2024-08-07 13:49
Severity ?
EPSS score ?
Summary
The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-07T13:49:57.193Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "oval:org.mitre.oval:def:5465", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465", }, { name: "35336", tags: [ "vdb-entry", "x_refsource_OSVDB", "x_transferred", ], url: "http://www.osvdb.org/35336", }, { name: "VU#739224", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "http://www.kb.cert.org/vuls/id/739224", }, { name: "ADV-2007-1803", tags: [ "vdb-entry", "x_refsource_VUPEN", "x_transferred", ], url: "http://www.vupen.com/english/advisories/2007/1803", }, { name: "1018053", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1018053", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.gamasec.net/english/gs07-01.html", }, { name: "25285", tags: [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred", ], url: "http://secunia.com/advisories/25285", }, { name: "1018054", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id?1018054", }, { name: "23980", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/23980", }, { name: "20070514 HTTP Full-Width and Half-Width Unicode Encoding Evasion", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html", }, { name: "cisco-scanengine-unicode-security-bypass(34277)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34277", }, { name: "20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred", ], url: "http://www.securityfocus.com/archive/1/468633/100/0/threaded", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2007-05-14T00:00:00", descriptions: [ { lang: "en", value: "The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-10-16T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "oval:org.mitre.oval:def:5465", tags: [ "vdb-entry", "signature", "x_refsource_OVAL", ], url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465", }, { name: "35336", tags: [ "vdb-entry", "x_refsource_OSVDB", ], url: "http://www.osvdb.org/35336", }, { name: "VU#739224", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "http://www.kb.cert.org/vuls/id/739224", }, { name: "ADV-2007-1803", tags: [ "vdb-entry", "x_refsource_VUPEN", ], url: "http://www.vupen.com/english/advisories/2007/1803", }, { name: "1018053", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1018053", }, { tags: [ "x_refsource_MISC", ], url: "http://www.gamasec.net/english/gs07-01.html", }, { name: "25285", tags: [ "third-party-advisory", "x_refsource_SECUNIA", ], url: "http://secunia.com/advisories/25285", }, { name: "1018054", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id?1018054", }, { name: "23980", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/23980", }, { name: "20070514 HTTP Full-Width and Half-Width Unicode Encoding Evasion", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html", }, { name: "cisco-scanengine-unicode-security-bypass(34277)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34277", }, { name: "20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability", tags: [ "mailing-list", "x_refsource_BUGTRAQ", ], url: "http://www.securityfocus.com/archive/1/468633/100/0/threaded", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2007-2688", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "oval:org.mitre.oval:def:5465", refsource: "OVAL", url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465", }, { name: "35336", refsource: "OSVDB", url: "http://www.osvdb.org/35336", }, { name: "VU#739224", refsource: "CERT-VN", url: "http://www.kb.cert.org/vuls/id/739224", }, { name: "ADV-2007-1803", refsource: "VUPEN", url: "http://www.vupen.com/english/advisories/2007/1803", }, { name: "1018053", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1018053", }, { name: "http://www.gamasec.net/english/gs07-01.html", refsource: "MISC", url: "http://www.gamasec.net/english/gs07-01.html", }, { name: "25285", refsource: "SECUNIA", url: "http://secunia.com/advisories/25285", }, { name: "1018054", refsource: "SECTRACK", url: "http://www.securitytracker.com/id?1018054", }, { name: "23980", refsource: "BID", url: "http://www.securityfocus.com/bid/23980", }, { name: "20070514 HTTP Full-Width and Half-Width Unicode Encoding Evasion", refsource: "CISCO", url: "http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html", }, { name: "cisco-scanengine-unicode-security-bypass(34277)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/34277", }, { name: "20070515 GS07-01 Full-Width and Half-Width Unicode Encoding IDS/IPS/WAF Bypass Vulnerability", refsource: "BUGTRAQ", url: "http://www.securityfocus.com/archive/1/468633/100/0/threaded", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2007-2688", datePublished: "2007-05-16T01:00:00", dateReserved: "2007-05-15T00:00:00", dateUpdated: "2024-08-07T13:49:57.193Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B82862D-C006-4846-987B-F8FB113DF984\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.0\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C36B2596-ECC6-47B6-9BB6-95F903281EFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CF995-082E-47CD-8673-F8F9832DA6E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.0\\\\(6\\\\)p1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2AEC4E54-69C0-4115-8F57-6B25694BA07D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EC9FE98-33D1-4072-A9AE-91E014227599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1a\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBC14025-7D62-4264-A898-5085E0227F79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1b\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44C6A1AB-7598-4477-AB3D-4648813855FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1c\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E703CAFC-2ED8-4B71-8559-593BF46EE568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1d\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE533A9E-2868-4C66-8ADD-D1785FFD4726\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1e\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E4B9CD-D564-4FB4-BE61-B5E61E8847D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(p1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"344A1DD4-8A6B-46CF-B334-CE809932C7F4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79528F96-FD42-4A76-82EE-4B1324D53B5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5F31EAA-F76F-4182-B90D-6997E52EEB25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F86F790-6247-42F2-9487-3D60A2842F52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DBEA01D2-B985-4575-AF00-144CE2E3024D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA7F94E8-86FC-456B-A7BB-57953F67F754\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7126E176-D739-4102-8F10-1EEB8C6A219D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"752C3C6B-910D-4153-A162-DF255F60306B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84900BB3-B49F-448A-9E04-FE423FBCCC4F\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.\"}, {\"lang\": \"es\", \"value\": \"El Sistema de Prevenci\\u00f3n de Intrusiones (Intrusion Prevention System o IPS) de Cisco e IOS con el juego de funcionalidades Firewall/IPS no maneja adecuadamente determinadas codificaciones de caracteres Unicode de ancho completo y medio, lo cual podr\\u00eda permitir a atacantes remotos evadir la detecci\\u00f3n de tr\\u00e1fico HTTP.\"}]", id: "CVE-2007-2688", lastModified: "2024-11-21T00:31:24.767", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2007-05-16T01:19:00.000", references: "[{\"url\": \"http://secunia.com/advisories/25285\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.gamasec.net/english/gs07-01.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/739224\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.osvdb.org/35336\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/468633/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/23980\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1018053\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id?1018054\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1803\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34277\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/25285\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gamasec.net/english/gs07-01.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/739224\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.osvdb.org/35336\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/468633/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/23980\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1018053\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1018054\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/1803\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34277\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2007-2688\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-05-16T01:19:00.000\",\"lastModified\":\"2024-11-21T00:31:24.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Cisco Intrusion Prevention System (IPS) and IOS with Firewall/IPS Feature Set do not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.\"},{\"lang\":\"es\",\"value\":\"El Sistema de Prevención de Intrusiones (Intrusion Prevention System o IPS) de Cisco e IOS con el juego de funcionalidades Firewall/IPS no maneja adecuadamente determinadas codificaciones de caracteres Unicode de ancho completo y medio, lo cual podría permitir a atacantes remotos evadir la detección de tráfico HTTP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B82862D-C006-4846-987B-F8FB113DF984\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.0\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36B2596-ECC6-47B6-9BB6-95F903281EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CF995-082E-47CD-8673-F8F9832DA6E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.0\\\\(6\\\\)p1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEC4E54-69C0-4115-8F57-6B25694BA07D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EC9FE98-33D1-4072-A9AE-91E014227599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1a\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBC14025-7D62-4264-A898-5085E0227F79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1b\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C6A1AB-7598-4477-AB3D-4648813855FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1c\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E703CAFC-2ED8-4B71-8559-593BF46EE568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1d\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE533A9E-2868-4C66-8ADD-D1785FFD4726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(1e\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E4B9CD-D564-4FB4-BE61-B5E61E8847D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:ips_sensor_software:5.1\\\\(p1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"344A1DD4-8A6B-46CF-B334-CE809932C7F4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79528F96-FD42-4A76-82EE-4B1324D53B5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F31EAA-F76F-4182-B90D-6997E52EEB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F86F790-6247-42F2-9487-3D60A2842F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C398460-3F38-4AA7-A4B1-FD8A01588DB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0st:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBEA01D2-B985-4575-AF00-144CE2E3024D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7F94E8-86FC-456B-A7BB-57953F67F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F2F9EC5-EDA2-4C99-BBF1-2F2C92AACE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7126E176-D739-4102-8F10-1EEB8C6A219D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"752C3C6B-910D-4153-A162-DF255F60306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BC49F2-3DCB-45F0-9030-13F6415EE178\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84900BB3-B49F-448A-9E04-FE423FBCCC4F\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/25285\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.gamasec.net/english/gs07-01.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/739224\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/35336\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/468633/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/23980\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1018053\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1018054\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1803\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34277\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25285\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_response09186a008083f82e.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gamasec.net/english/gs07-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/739224\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.osvdb.org/35336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/468633/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/23980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1018053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1018054\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1803\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34277\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5465\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.