var-200703-0085
Vulnerability from variot
Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet. According to Cisco Systems information, the affected systems are limited. For details, check the information provided by the vendor.Crafted by a third party MSPLS By processing the packet, a specific device may interfere with service operation (DoS) It may be in a state. Cisco Catalyst switches and routers are prone to multiple remote denial-of-service vulnerabilities because the device fails to handle exceptional conditions. An attacker can exploit these issues to restart the affected device. Repeated exploits may lead to denial-of-service conditions. IOS is prone to a denial-of-service vulnerability.
The vulnerability is caused due to an unspecified error when processing MPLS packets and can be exploited to reload an affected system. http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200703-0085", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2sxb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2sxd" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(18\\)sxf4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2sxf" }, { "model": "catalyst 6500", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2sxa" }, { "model": "catalyst 6000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "catalyst 7600", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "7600 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "catalyst 6000 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "catalyst 6500 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "12.2" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "6500" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "60000" }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7600" }, { "model": "catalyst 6500", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "catalyst 7600", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "catalyst 6000", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sxf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sxf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sxd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sxb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sxa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sxf4", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "BID", "id": "22750" }, { "db": "BID", "id": "86587" }, { "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "db": "NVD", "id": "CVE-2007-1258" }, { "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_7600:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_6500:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-1258" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Security bulletin", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-117" } ], "trust": 0.6 }, "cve": "CVE-2007-1258", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2007-1258", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-24620", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-1258", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200703-117", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-24620", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-24620" }, { "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "db": "NVD", "id": "CVE-2007-1258" }, { "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in Cisco IOS 12.2SXA, SXB, SXD, and SXF; and the MSFC2, MSFC2a and MSFC3 running in Hybrid Mode on Cisco Catalyst 6000, 6500 and Cisco 7600 series systems; allows remote attackers on a local network segment to cause a denial of service (software reload) via a certain MPLS packet. According to Cisco Systems information, the affected systems are limited. For details, check the information provided by the vendor.Crafted by a third party MSPLS By processing the packet, a specific device may interfere with service operation (DoS) It may be in a state. Cisco Catalyst switches and routers are prone to multiple remote denial-of-service vulnerabilities because the device fails to handle exceptional conditions. \nAn attacker can exploit these issues to restart the affected device. Repeated exploits may lead to denial-of-service conditions. IOS is prone to a denial-of-service vulnerability. \n\nThe vulnerability is caused due to an unspecified error when\nprocessing MPLS packets and can be exploited to reload an affected\nsystem. \nhttp://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-1258" }, { "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "db": "BID", "id": "22750" }, { "db": "BID", "id": "86587" }, { "db": "VULHUB", "id": "VHN-24620" }, { "db": "PACKETSTORM", "id": "54748" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-1258", "trust": 2.8 }, { "db": "SECTRACK", "id": "1017709", "trust": 2.0 }, { "db": "SECUNIA", "id": "24348", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-0782", "trust": 1.7 }, { "db": "OSVDB", "id": "33067", "trust": 1.7 }, { "db": "BID", "id": "22750", "trust": 1.1 }, { "db": "XF", "id": "32748", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2007-000184", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200703-117", "trust": 0.7 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:5869", "trust": 0.6 }, { "db": "CISCO", "id": "20070228 CISCO CATALYST 6000, 6500 AND CISCO 7600 SERIES MPLS PACKET VULNERABILITY", "trust": 0.6 }, { "db": "BID", "id": "86587", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-24620", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "54748", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-24620" }, { "db": "BID", "id": "22750" }, { "db": "BID", "id": "86587" }, { "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "db": "PACKETSTORM", "id": "54748" }, { "db": "NVD", "id": "CVE-2007-1258" }, { "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "id": "VAR-200703-0085", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-24620" } ], "trust": 0.4056849 }, "last_update_date": "2023-12-18T13:35:26.687000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20070228-mpls", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-1258" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20070228-mpls.shtml" }, { "trust": 2.0, "url": "http://www.securitytracker.com/id?1017709" }, { "trust": 1.7, "url": "http://osvdb.org/33067" }, { "trust": 1.7, "url": "http://secunia.com/advisories/24348" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a5869" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/0782" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32748" }, { "trust": 0.9, "url": "http://xforce.iss.net/xforce/xfdb/32748" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1258" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-1258" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/22750" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/0782" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:5869" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/hw/switches/index.html" }, { "trust": 0.3, "url": "/archive/1/461545" }, { "trust": 0.1, "url": "http://secunia.com/advisories/24348/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/50/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/disassembling_og_reversing/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/182/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-24620" }, { "db": "BID", "id": "22750" }, { "db": "BID", "id": "86587" }, { "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "db": "PACKETSTORM", "id": "54748" }, { "db": "NVD", "id": "CVE-2007-1258" }, { "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-24620" }, { "db": "BID", "id": "22750" }, { "db": "BID", "id": "86587" }, { "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "db": "PACKETSTORM", "id": "54748" }, { "db": "NVD", "id": "CVE-2007-1258" }, { "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-03T00:00:00", "db": "VULHUB", "id": "VHN-24620" }, { "date": "2007-02-28T00:00:00", "db": "BID", "id": "22750" }, { "date": "2007-03-03T00:00:00", "db": "BID", "id": "86587" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "date": "2007-03-05T23:12:53", "db": "PACKETSTORM", "id": "54748" }, { "date": "2007-03-03T20:19:00", "db": "NVD", "id": "CVE-2007-1258" }, { "date": "2007-02-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-24620" }, { "date": "2007-03-01T01:35:00", "db": "BID", "id": "22750" }, { "date": "2007-03-03T00:00:00", "db": "BID", "id": "86587" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-000184" }, { "date": "2017-10-11T01:31:48.157000", "db": "NVD", "id": "CVE-2007-1258" }, { "date": "2009-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200703-117" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "22750" }, { "db": "BID", "id": "86587" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS of MPLS Service disruption due to processing (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-000184" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200703-117" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.