CVE-2011-0394
Vulnerability from cvelistv5
Published
2011-02-25 11:00
Modified
2024-08-06 21:51
Severity ?
EPSS score ?
Summary
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "cisco-fwsm-sccp-dos(65593)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "46518", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46518" }, { "name": "ADV-2011-0494", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "name": "43453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43453" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "1025109", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025109" }, { "name": "20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "cisco-fwsm-sccp-dos(65593)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "name": "1025108", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025108" }, { "name": "46518", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46518" }, { "name": "ADV-2011-0494", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "name": "43453", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43453" }, { "name": "43488", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "1025109", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025109" }, { "name": "20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2011-0394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20110223 Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml" }, { "name": "cisco-fwsm-sccp-dos(65593)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65593" }, { "name": "1025108", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025108" }, { "name": "46518", "refsource": "BID", "url": "http://www.securityfocus.com/bid/46518" }, { "name": "ADV-2011-0494", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0494" }, { "name": "43453", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43453" }, { "name": "43488", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43488" }, { "name": "ADV-2011-0493", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0493" }, { "name": "1025109", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025109" }, { "name": "20110223 Cisco Firewall Services Module Skinny Client Control Protocol Inspection Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2011-0394", "datePublished": "2011-02-25T11:00:00", "dateReserved": "2011-01-07T00:00:00", "dateUpdated": "2024-08-06T21:51:09.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC516FF2-7C0D-4F58-B61B-34FE7294DC1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.3\\\\(1\\\\)\", \"matchCriteriaId\": \"F102F5EF-0B67-4FD7-898E-D5EDD8B822D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85ED2D96-5CC9-4851-986A-C9ED5E2D96CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15ECB359-7290-4732-96F2-AFCEE21C7899\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DA2F01C-ECF1-477B-A413-75D0EB817079\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC150564-7413-401A-9DD8-8AD773F1D8F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0714F9E-75AD-4405-BBC3-E0D817C05EF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5.2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9649696-DE81-48C7-A276-17E1ECADAD5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(6.7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EA0DDDD-C987-4DA6-ADEE-77B387C26A92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E84099EB-2535-4A9F-8355-FF937CFBD122\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C599F894-DAD2-4231-8BB8-1427E7C02D60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49696766-ECCE-4903-AA54-271EFEA58B8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F60C12-71C9-47C6-B43F-A0374419D736\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C853CD9-F451-406E-A515-3BDC34E55639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD7C28DC-B15F-486B-96F1-D08529B7374A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B03A1408-A55A-4482-B239-B13094B13BFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*\", \"matchCriteriaId\": \"62DC7025-F067-45CB-BEA6-ED16A5BD2896\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1557499-D1A1-4A26-80DA-A3D66AA53580\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2649C78C-D742-4E6F-950F-54BF7CF797C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.27\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"469CFE0C-6319-46F3-8D31-4850F5E6A830\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.48\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4333600F-0277-4D6C-922E-53FA01CF3C2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.49\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35AFDFE9-CCC9-453B-A081-939D1D554379\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C82C545-6796-4B67-A97D-0435D41C63C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA336EBF-FA9A-4B80-A486-446A1C4B72F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B53107-BCD0-4D3E-B090-91D6BD6139C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C926091-D9A6-4264-8E9A-52AFCBC09D34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE82E4AC-BE77-4A45-839F-45163D64A4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1.22\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B521F270-2D51-48BE-BC29-0EDED33FA30B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39BA51CC-2ADA-4527-8D47-D821BBFA5EFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C73F417-0CF4-4E78-9B33-939F0E41994E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67BABA2F-EE28-4914-8130-6768EC599B65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.15\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C912270C-6ABB-4149-8E67-96028B45C312\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.16\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB2631B6-F238-4FE3-AA34-703FFB6D6803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.17\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80F1C112-F1C1-4703-8EE0-2FC9F8B233CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.18\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D55D3385-FEE7-44AA-A65A-50924FDC1BFC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.19\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC223DE2-90CA-43CD-8EBF-C9C351D10187\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.48\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95627941-30D8-452F-B6C8-76D2BEE93514\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"364CA0EA-F85E-4C4B-96D8-A7256F413844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DA3389C-86FE-45F7-97D7-E3386403944F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"656D49C2-4F2E-4369-8933-FF74A3CD51EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C68E73D6-A207-4276-A972-52B859CD958A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E406214-2776-42C2-B777-92E6420FBFBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73BA05D1-78A7-4F90-9448-3F2011EE3EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33F24697-0124-4326-8499-29931D57D246\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3.9\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7236893-3EE9-4DBE-8A75-5294FD82E922\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97E5BC7E-399F-4FD2-8024-2F4F621BC577\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"465313C5-BFB9-458A-8150-8F7BA1F8C386\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C808D46-C846-4C53-A713-150C3FED3FAB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CB79D96-75EA-4B4F-99A7-9AB4158B7301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FCBA3A3-7C8F-481A-9BEC-78981547F8BE\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2706D3BA-37A2-4D71-94DD-5386F5C94374\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(5\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74868197-D48D-43DE-A65B-A56369DA6502\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F72BB334-B050-4B52-868A-49250EF1E845\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(16\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DFEFB7-A745-4D5F-A1AB-F6E3971894A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(17\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3181F43-6CB7-47C1-A68A-432995454F14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(18\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39983B88-A340-4712-9E5C-C3D492DDF09C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(19\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E29A007-4664-4822-AC78-7C0153417D9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33A3DD4F-CD94-4BD7-9365-4ED26872697E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE5DA712-F36D-4755-9158-57A5B0F95BE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AA71976-7561-4B9D-BFB3-87A06711EB46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(13\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5732020-BB4A-4F87-B63A-31BD439FE3AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"493B34EA-B262-4123-958C-C2B563A66A7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(16\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C8F81C8-99D5-40CA-972A-71EB0CF43FA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BF07192-27C3-47DA-A3EA-C5FA84A43ADF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6716B573-328C-455E-AB36-315DD6588AA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(6\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CB3A6B4-C567-4E96-A735-74F50C7A6906\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(7\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"259252A1-C0B1-4679-B04E-29DDDB4ACAD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(8\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B944351-D4ED-42A1-969E-B7DC864B0CBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(10\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51D7EBD7-2BEA-4C30-9E89-A9913EE268C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(11\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"822A8177-A69D-495E-9437-E5567A27F60D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(12\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1226F8D6-7402-457B-8AEC-7164D735ECF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(13\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"04F7CD17-7EAC-4B77-8F59-8EB5362091DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(14\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97CC4932-94B6-447E-8294-D6732B46CB41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8F281A7-0C77-46A2-8838-D3E9207FB85D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C3DCF01-326D-44A1-ADAB-CF52F7629082\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(2\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E03AD49-1267-4866-A059-DE97EA79D769\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(3\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"889F34A9-81CD-4381-9708-A2481C95FE21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26E8B157-67EF-4DFB-BFBB-7794A048E43C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.\"}, {\"lang\": \"es\", \"value\": \"Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.11), v7.1 y v7.2 anterior a v7.2(5.1), v8.0 anterior a v8.0 (5.19), v8.1 anterior a v8.1 (2.47), v8.2 anterior a v8.2 (2.19), y v8.3 anterior a v8.3 (1.8); dispositivos Cisco PIX Security Appliances Serie 500; y Cisco Firewall Services Module (tambi\\u00e9n conocido como FWSM) v3.1 anterior a v3.1 (20), v3.2 anterior a v3.2 (20), v4.0 anterior a v4.0 (15), y v4.1 anterior a v4.1(5) permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (recarga de dispositivo) a trav\\u00e9s de un mensaje Skinny Client Control Protocol (SCCP) manipulado, tambi\\u00e9n conocido como error ID CSCtg69457 y CSCtl84952.\"}]", "id": "CVE-2011-0394", "lastModified": "2024-11-21T01:23:52.650", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2011-02-25T12:00:19.213", "references": "[{\"url\": \"http://secunia.com/advisories/43453\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/43488\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46518\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id?1025108\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.securitytracker.com/id?1025109\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0493\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0494\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/65593\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"http://secunia.com/advisories/43453\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/43488\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/46518\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025108\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025109\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0493\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2011/0494\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/65593\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-399\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2011-0394\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2011-02-25T12:00:19.213\",\"lastModified\":\"2024-11-21T01:23:52.650\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.0 before 7.0(8.11), 7.1 and 7.2 before 7.2(5.1), 8.0 before 8.0(5.19), 8.1 before 8.1(2.47), 8.2 before 8.2(2.19), and 8.3 before 8.3(1.8); Cisco PIX Security Appliances 500 series devices; and Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(20), 3.2 before 3.2(20), 4.0 before 4.0(15), and 4.1 before 4.1(5) allow remote attackers to cause a denial of service (device reload) via a malformed Skinny Client Control Protocol (SCCP) message, aka Bug IDs CSCtg69457 and CSCtl84952.\"},{\"lang\":\"es\",\"value\":\"Dispositivos de la serie Cisco Adaptive Security Appliances (ASA) 5500 con el software v7.0 anterior a v7.0(8.11), v7.1 y v7.2 anterior a v7.2(5.1), v8.0 anterior a v8.0 (5.19), v8.1 anterior a v8.1 (2.47), v8.2 anterior a v8.2 (2.19), y v8.3 anterior a v8.3 (1.8); dispositivos Cisco PIX Security Appliances Serie 500; y Cisco Firewall Services Module (tambi\u00e9n conocido como FWSM) v3.1 anterior a v3.1 (20), v3.2 anterior a v3.2 (20), v4.0 anterior a v4.0 (15), y v4.1 anterior a v4.1(5) permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de un mensaje Skinny Client Control Protocol (SCCP) manipulado, tambi\u00e9n conocido como error ID CSCtg69457 y CSCtl84952.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC516FF2-7C0D-4F58-B61B-34FE7294DC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance:8.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDD95F2F-1C0E-4673-AE36-1BAF40EC7CC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.3\\\\(1\\\\)\",\"matchCriteriaId\":\"F102F5EF-0B67-4FD7-898E-D5EDD8B822D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85ED2D96-5CC9-4851-986A-C9ED5E2D96CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15ECB359-7290-4732-96F2-AFCEE21C7899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA2F01C-ECF1-477B-A413-75D0EB817079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC150564-7413-401A-9DD8-8AD773F1D8F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0714F9E-75AD-4405-BBC3-E0D817C05EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(5.2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9649696-DE81-48C7-A276-17E1ECADAD5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0\\\\(6.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31A44B7-7DD8-4ECF-9BA0-7D1983A2DB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7632C245-04C6-4E78-87B7-55CCCA6FD6C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA0DDDD-C987-4DA6-ADEE-77B387C26A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84099EB-2535-4A9F-8355-FF937CFBD122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C599F894-DAD2-4231-8BB8-1427E7C02D60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49696766-ECCE-4903-AA54-271EFEA58B8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F60C12-71C9-47C6-B43F-A0374419D736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C853CD9-F451-406E-A515-3BDC34E55639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C28DC-B15F-486B-96F1-D08529B7374A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03A1408-A55A-4482-B239-B13094B13BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.0.8:interim:*:*:*:*:*:*\",\"matchCriteriaId\":\"62DC7025-F067-45CB-BEA6-ED16A5BD2896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E623855-FB2B-4B8A-85E8-B8DC29A3FBB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1557499-D1A1-4A26-80DA-A3D66AA53580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2649C78C-D742-4E6F-950F-54BF7CF797C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.27\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"469CFE0C-6319-46F3-8D31-4850F5E6A830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.48\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4333600F-0277-4D6C-922E-53FA01CF3C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(2.49\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AFDFE9-CCC9-453B-A081-939D1D554379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C82C545-6796-4B67-A97D-0435D41C63C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA336EBF-FA9A-4B80-A486-446A1C4B72F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B53107-BCD0-4D3E-B090-91D6BD6139C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C926091-D9A6-4264-8E9A-52AFCBC09D34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE82E4AC-BE77-4A45-839F-45163D64A4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(1.22\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B84E46E-E5CA-4EEC-87C3-FD818EA37DFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95B934A6-6C23-4A3F-A5F1-BCE0F0F3295A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B25C03A-CADD-4B10-B4C9-674A4DEBDEE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B521F270-2D51-48BE-BC29-0EDED33FA30B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39BA51CC-2ADA-4527-8D47-D821BBFA5EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C73F417-0CF4-4E78-9B33-939F0E41994E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67BABA2F-EE28-4914-8130-6768EC599B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.15\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C912270C-6ABB-4149-8E67-96028B45C312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB2631B6-F238-4FE3-AA34-703FFB6D6803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F1C112-F1C1-4703-8EE0-2FC9F8B233CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55D3385-FEE7-44AA-A65A-50924FDC1BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC223DE2-90CA-43CD-8EBF-C9C351D10187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2\\\\(2.48\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3DF7D4C-48F4-4138-80EA-7AEEB8AFE498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E853B8BF-07F5-46DF-8DEA-302F68B8B086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95627941-30D8-452F-B6C8-76D2BEE93514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"364CA0EA-F85E-4C4B-96D8-A7256F413844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB954E-D1F4-4B29-B782-2E9917D82DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:7.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA3389C-86FE-45F7-97D7-E3386403944F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AFE6E41-E5C3-48AA-A534-A1AF3E86E3F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"656D49C2-4F2E-4369-8933-FF74A3CD51EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C68E73D6-A207-4276-A972-52B859CD958A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44B4A87-D033-4C3F-B1F8-BC40E2CCDC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E406214-2776-42C2-B777-92E6420FBFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73BA05D1-78A7-4F90-9448-3F2011EE3EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C6ABC8-767A-4B7D-A286-F9C6DF61AC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F24697-0124-4326-8499-29931D57D246\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(3.9\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7236893-3EE9-4DBE-8A75-5294FD82E922\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E5BC7E-399F-4FD2-8024-2F4F621BC577\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2C8AFA-A4B6-44A2-B00C-1950997493C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465313C5-BFB9-458A-8150-8F7BA1F8C386\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2.2:interim:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C808D46-C846-4C53-A713-150C3FED3FAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:5500_series_adaptive_security_appliance:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB79D96-75EA-4B4F-99A7-9AB4158B7301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:asa_5500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCBA3A3-7C8F-481A-9BEC-78981547F8BE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:pix_500:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2706D3BA-37A2-4D71-94DD-5386F5C94374\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5551EDC1-1FE7-4FAF-9ABC-E862B3100BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74868197-D48D-43DE-A65B-A56369DA6502\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72BB334-B050-4B52-868A-49250EF1E845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DFEFB7-A745-4D5F-A1AB-F6E3971894A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(17\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3181F43-6CB7-47C1-A68A-432995454F14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(18\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39983B88-A340-4712-9E5C-C3D492DDF09C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.1\\\\(19\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E29A007-4664-4822-AC78-7C0153417D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A3DD4F-CD94-4BD7-9365-4ED26872697E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5DA712-F36D-4755-9158-57A5B0F95BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA71976-7561-4B9D-BFB3-87A06711EB46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F4F6A1-5C6F-4A54-80BE-1B77DFA47DAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5732020-BB4A-4F87-B63A-31BD439FE3AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493B34EA-B262-4123-958C-C2B563A66A7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:3.2\\\\(16\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F81C8-99D5-40CA-972A-71EB0CF43FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF07192-27C3-47DA-A3EA-C5FA84A43ADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6716B573-328C-455E-AB36-315DD6588AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(6\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB3A6B4-C567-4E96-A735-74F50C7A6906\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(7\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"259252A1-C0B1-4679-B04E-29DDDB4ACAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(8\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B944351-D4ED-42A1-969E-B7DC864B0CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(10\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D7EBD7-2BEA-4C30-9E89-A9913EE268C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"822A8177-A69D-495E-9437-E5567A27F60D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(12\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1226F8D6-7402-457B-8AEC-7164D735ECF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(13\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F7CD17-7EAC-4B77-8F59-8EB5362091DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.0\\\\(14\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97CC4932-94B6-447E-8294-D6732B46CB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F281A7-0C77-46A2-8838-D3E9207FB85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C3DCF01-326D-44A1-ADAB-CF52F7629082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(2\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E03AD49-1267-4866-A059-DE97EA79D769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(3\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"889F34A9-81CD-4381-9708-A2481C95FE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:firewall_services_module_software:4.1\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E8B157-67EF-4DFB-BFBB-7794A048E43C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:cisco:firewall_services_module:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A9CB22A-21E0-46F6-B6CD-BB38A80FA7A4\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/43453\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://secunia.com/advisories/43488\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46518\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id?1025108\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id?1025109\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0493\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0494\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65593\",\"source\":\"ykramarz@cisco.com\"},{\"url\":\"http://secunia.com/advisories/43453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e148.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b6e14d.shtml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/46518\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025109\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/65593\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.