CVE-2013-5663
Vulnerability from cvelistv5
Published
2013-08-31 17:00
Modified
2024-08-06 17:15
Severity ?
EPSS score ?
Summary
The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:15:21.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://pastie.org/pastes/5568186/text" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2013-5663" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T16:03:44", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://pastie.org/pastes/5568186/text" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2013-5663" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-5663", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/", "refsource": "CONFIRM", "url": "http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/" }, { "name": "http://pastie.org/pastes/5568186/text", "refsource": "MISC", "url": "http://pastie.org/pastes/5568186/text" }, { "name": "http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx", "refsource": "MISC", "url": "http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx" }, { "name": "https://security.paloaltonetworks.com/CVE-2013-5663", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2013-5663" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-5663", "datePublished": "2013-08-31T17:00:00", "dateReserved": "2013-08-31T00:00:00", "dateUpdated": "2024-08-06T17:15:21.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"4.0.8\", \"matchCriteriaId\": \"07C92F2C-BDC6-4B92-B8E4-C7750DDFAF52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9547FFD1-8161-45C4-BEC9-0BC30FA46A92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0384B38B-C69B-4DAB-9276-7B10AAAD588F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB324D9A-7A8A-4AD6-89F7-F4F9EA2441DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"540806F7-4C35-43CD-8AC0-7D9FAC42FEF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"818D028C-627D-49A4-ACD6-44821BA5106A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C789DFD-189D-4CF3-A3BF-B2B854BEFE9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30831F67-692C-497A-8F33-59F57AE2D513\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81D87787-B186-46A2-8A11-0AEDFBD17D7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E1861E9-228B-4A82-B885-987CEFAA7974\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C3773D9-21A6-4102-879B-C902D7F33F1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17BB4059-3A6E-451F-BE4F-BF14C8186F9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81D4D653-1BBD-4228-AE3F-62C9F75DE8AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27837759-0371-4A94-9E54-66155FCCB072\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEB6E3EA-ED06-4934-9349-DF0AB9B8EBB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5F76CD5-65D6-486C-96E1-999BF4141A38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54019AC0-BB5E-4AD0-A06E-526BBEED83B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CC2A5DE-9C55-4CAE-B673-818CE29221ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.8-h3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33FAA6DA-4686-4C3A-A5F4-05A2FFFA479D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E63C15B7-B83A-4ED1-99A7-71619B247645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:4.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DF92DA6-CE52-40A5-A79A-CA9D9CFEF39B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:5.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9560C45E-6F66-47BA-B4B5-8DFBB72E80A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paloaltonetworks:pan-os:5.0.0-h1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD60F39D-3941-4049-90AD-102A6351291B\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.\"}, {\"lang\": \"es\", \"value\": \"La caracter\\u00edstica App-ID cache en Palo Alto Networks PAN-OS anterior a 4.0.14, 4.1.x anterior a 4.1.11 y 5.0.x anterior a 5.0.2, permite a atacantes remotos evitar las pol\\u00edticas de seguridad establecidas a trav\\u00e9s de una petici\\u00f3n que provoca un cacheo no v\\u00e1lido, como se demostr\\u00f3 mediante la identificaci\\u00f3n incorrecta del tr\\u00e1fico HTTP como tr\\u00e1fico SIP. Aka Ref ID 47195.\"}]", "id": "CVE-2013-5663", "lastModified": "2024-11-21T01:57:54.450", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2013-08-31T17:55:03.650", "references": "[{\"url\": \"http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://pastie.org/pastes/5568186/text\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2013-5663\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://pastie.org/pastes/5568186/text\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2013-5663\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2013-5663\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2013-08-31T17:55:03.650\",\"lastModified\":\"2024-11-21T01:57:54.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica App-ID cache en Palo Alto Networks PAN-OS anterior a 4.0.14, 4.1.x anterior a 4.1.11 y 5.0.x anterior a 5.0.2, permite a atacantes remotos evitar las pol\u00edticas de seguridad establecidas a trav\u00e9s de una petici\u00f3n que provoca un cacheo no v\u00e1lido, como se demostr\u00f3 mediante la identificaci\u00f3n incorrecta del tr\u00e1fico HTTP como tr\u00e1fico SIP. Aka Ref ID 47195.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.0.8\",\"matchCriteriaId\":\"07C92F2C-BDC6-4B92-B8E4-C7750DDFAF52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9547FFD1-8161-45C4-BEC9-0BC30FA46A92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0384B38B-C69B-4DAB-9276-7B10AAAD588F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB324D9A-7A8A-4AD6-89F7-F4F9EA2441DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540806F7-4C35-43CD-8AC0-7D9FAC42FEF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"818D028C-627D-49A4-ACD6-44821BA5106A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C789DFD-189D-4CF3-A3BF-B2B854BEFE9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30831F67-692C-497A-8F33-59F57AE2D513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D87787-B186-46A2-8A11-0AEDFBD17D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E1861E9-228B-4A82-B885-987CEFAA7974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3773D9-21A6-4102-879B-C902D7F33F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17BB4059-3A6E-451F-BE4F-BF14C8186F9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D4D653-1BBD-4228-AE3F-62C9F75DE8AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27837759-0371-4A94-9E54-66155FCCB072\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEB6E3EA-ED06-4934-9349-DF0AB9B8EBB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5F76CD5-65D6-486C-96E1-999BF4141A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54019AC0-BB5E-4AD0-A06E-526BBEED83B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CC2A5DE-9C55-4CAE-B673-818CE29221ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.8-h3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33FAA6DA-4686-4C3A-A5F4-05A2FFFA479D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E63C15B7-B83A-4ED1-99A7-71619B247645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:4.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DF92DA6-CE52-40A5-A79A-CA9D9CFEF39B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9560C45E-6F66-47BA-B4B5-8DFBB72E80A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:5.0.0-h1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD60F39D-3941-4049-90AD-102A6351291B\"}]}]}],\"references\":[{\"url\":\"http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://pastie.org/pastes/5568186/text\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.paloaltonetworks.com/CVE-2013-5663\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://pastie.org/pastes/5568186/text\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.paloaltonetworks.com/CVE-2013-5663\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.