var-200411-0075
Vulnerability from variot
Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead. Cisco Systems optical networking systems software Exists in unspecified vulnerabilities.None. Cisco has reported multiple vulnerabilities in the following platforms: Cisco ONS 15327 Edge Optical Transport Platform Cisco ONS 15454 Optical Transport Platform Cisco ONS 15454 SDH Multiplexer Platform Cisco ONS 15600 Multiservice Switching Platform These issues could permit unauthorized access to devices, including unauthenticated access to GET/PUT TFTP commands on affected platforms, denial of service attacks via incomplete TCP transactions and an issue that may allow locked out superuser accounts to still authenticate. It should be noted that the various ONS platforms are intended to be deployed on networks that are physically separated from the Internet, so exposure to these issues by remote attackers is limited. Cisco ONS 15327 4.1(3), ONS 15454 4.6(1), and ONS 15454 SD4.1(3) previous versions have vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200411-0075", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0.0" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.0" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(2\\)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(0\\)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(3\\)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(2\\)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(1\\)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(1\\)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.5" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.1(2)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.0.0" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.1(0)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "1.0" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.1(1)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.5" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.0(2)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": null }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.1.0" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.0(1)" }, { "model": "optical networking systems software", "scope": "eq", "trust": 0.8, "vendor": "\u30b7\u30b9\u30b3\u30b7\u30b9\u30c6\u30e0\u30ba", "version": "4.1(3)" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1\\(3\\)" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1\\(1\\)" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1\\(0\\)" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1\\(2\\)" }, { "model": "ons 15327", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1\\(0\\)" }, { "model": "ons 15327", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1\\(2\\)" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.0" }, { "model": "ons 15327", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.0\\(2\\)" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.1" }, { "model": "ons 15454 optical transport platform", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.0\\(1\\)" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "156001.0" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.5" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(2)" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(1)" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1(0)" }, { "model": "ons 15454sdh", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(2)" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1(0)" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.1" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0(1)" }, { "model": "ons optical transport platform", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "154544.0" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "153274.1(2)" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "153274.1(1)" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "153274.1(0)" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "153274.0(2)" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "153274.0(1)" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "153274.0" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "156001.3(0)" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "156001.1(1)" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "156001.1(0)" }, { "model": "ons 15454sdh", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.6(1)" }, { "model": "ons optical transport platform", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154544.1(3)" }, { "model": "ons optical transport platform", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154544.1(1)" }, { "model": "ons optical transport platform", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "154544.0(2)" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "153274.1(3)" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "153274.1(1)" }, { "model": "ons", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "153274.0(2)" } ], "sources": [ { "db": "BID", "id": "9699" }, { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "CNNVD", "id": "CNNVD-200411-163" }, { "db": "NVD", "id": "CVE-2004-0307" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0307" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This issue was reported in a Cisco security advisory.", "sources": [ { "db": "BID", "id": "9699" } ], "trust": 0.3 }, "cve": "CVE-2004-0307", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0307", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-8737", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0307", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200411-163", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-8737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-8737" }, { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "CNNVD", "id": "CNNVD-200411-163" }, { "db": "NVD", "id": "CVE-2004-0307" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ONS 15327 before 4.1(3), ONS 15454 before 4.6(1), and ONS 15454 SD before 4.1(3) allows remote attackers to cause a denial of service (reset) by not sending the ACK portion of the TCP three-way handshake and sending an invalid response instead. Cisco Systems optical networking systems software Exists in unspecified vulnerabilities.None. Cisco has reported multiple vulnerabilities in the following platforms:\nCisco ONS 15327 Edge Optical Transport Platform\nCisco ONS 15454 Optical Transport Platform\nCisco ONS 15454 SDH Multiplexer Platform\nCisco ONS 15600 Multiservice Switching Platform\nThese issues could permit unauthorized access to devices, including unauthenticated access to GET/PUT TFTP commands on affected platforms, denial of service attacks via incomplete TCP transactions and an issue that may allow locked out superuser accounts to still authenticate. \nIt should be noted that the various ONS platforms are intended to be deployed on networks that are physically separated from the Internet, so exposure to these issues by remote attackers is limited. Cisco ONS 15327 4.1(3), ONS 15454 4.6(1), and ONS 15454 SD4.1(3) previous versions have vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2004-0307" }, { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "BID", "id": "9699" }, { "db": "VULHUB", "id": "VHN-8737" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0307", "trust": 3.6 }, { "db": "BID", "id": "9699", "trust": 2.8 }, { "db": "OSVDB", "id": "4009", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2004-000940", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200411-163", "trust": 0.7 }, { "db": "CISCO", "id": "20040219 CISCO ONS 15327, ONS 15454, ONS 15454 SDH, AND ONS 15600 VULNERABILITIES", "trust": 0.6 }, { "db": "XF", "id": "15265", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-8737", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-8737" }, { "db": "BID", "id": "9699" }, { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "CNNVD", "id": "CNNVD-200411-163" }, { "db": "NVD", "id": "CVE-2004-0307" } ] }, "id": "VAR-200411-0075", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8737" } ], "trust": 0.01 }, "last_update_date": "2024-06-09T23:07:21.165000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cisco\u00a0ONS\u00a015327", "trust": 0.8, "url": "https://www.cisco.com/web/jp/product/hs/optical/ons15327/prodlit/pdf/0261_on15327.pdf" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000940" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "NVD", "id": "CVE-2004-0307" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040219-ons.shtml" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/9699" }, { "trust": 1.9, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15265" }, { "trust": 1.7, "url": "http://www.osvdb.org/4009" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0307" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/15265" } ], "sources": [ { "db": "VULHUB", "id": "VHN-8737" }, { "db": "BID", "id": "9699" }, { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "CNNVD", "id": "CNNVD-200411-163" }, { "db": "NVD", "id": "CVE-2004-0307" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-8737" }, { "db": "BID", "id": "9699" }, { "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "db": "CNNVD", "id": "CNNVD-200411-163" }, { "db": "NVD", "id": "CVE-2004-0307" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-11-23T00:00:00", "db": "VULHUB", "id": "VHN-8737" }, { "date": "2004-02-19T00:00:00", "db": "BID", "id": "9699" }, { "date": "2024-06-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "date": "2004-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200411-163" }, { "date": "2004-11-23T05:00:00", "db": "NVD", "id": "CVE-2004-0307" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-8737" }, { "date": "2009-07-12T03:06:00", "db": "BID", "id": "9699" }, { "date": "2024-06-07T09:02:00", "db": "JVNDB", "id": "JVNDB-2004-000940" }, { "date": "2005-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200411-163" }, { "date": "2018-10-30T16:26:17.390000", "db": "NVD", "id": "CVE-2004-0307" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200411-163" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Systems \u00a0optical\u00a0networking\u00a0systems\u00a0software\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000940" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "9699" }, { "db": "CNNVD", "id": "CNNVD-200411-163" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.