VAR-201308-0091

Vulnerability from variot - Updated: 2023-12-18 12:30

The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbitrary commands by appending crafted strings to values in GUI fields, aka Bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. plural Cisco Product Web Framework central management mode (central-management mode) Contains a vulnerability that allows arbitrary command execution. Vendors have confirmed this vulnerability Bug ID CSCug40609 , CSCug48855 , CSCug48921 , CSCug48872 , CSCuh21103 , CSCuh21020 ,and CSCug56790 It is released as.By a remotely authenticated user GUI An arbitrary command may be executed by adding a specially crafted string to the field value. Multiple Cisco Content Network and Video Delivery products are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. Successfully exploiting this issue may allow an unprivileged attacker to execute arbitrary commands on the affected system and completely compromise the affected devices. This issue is being tracked by Cisco bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. Cisco Wide Area Application Services (WAAS) is a set of WAN link acceleration software from Cisco. This software is mainly used in the link environment with small bandwidth and large delay

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201308-0091",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1.7"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "4.1.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.3.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.3.3"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.11.6"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.25"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.5"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.3.17"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.21"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.9.9"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.5.9"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.1.3"
      },
      {
        "model": "videoscape distribution suite service broker",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0.1"
      },
      {
        "model": "videoscape distribution suite optimization engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0.0"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.11"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.7"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.23"
      },
      {
        "model": "videoscape distribution suite service broker",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.1.0"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.3.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.27"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.7.7"
      },
      {
        "model": "internet streamer content delivery system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.6"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.11.6"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.7"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.9"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.17"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.13"
      },
      {
        "model": "videoscape delivery system for internet streamer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.2.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.13.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.1.7"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.3.5"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.3.15"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.7.3"
      },
      {
        "model": "internet streamer content delivery system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.15.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.29"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.3"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.1.10"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.7.10"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.7.7"
      },
      {
        "model": "videoscape delivery system origin server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.9.9"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.5.3"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.13.7"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.5.4"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.4.1"
      },
      {
        "model": "videoscape delivery system for internet streamer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "3.2.0"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.11.5"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.23"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.27"
      },
      {
        "model": "videoscape distribution suite service broker",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0.0"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4.5.7"
      },
      {
        "model": "enterprise content delivery network software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.5.5"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.21"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.9.5"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.1.3"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.5.2"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.1"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.13.7"
      },
      {
        "model": "internet streamer content delivery system",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "2.0"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.3.5"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.3"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.13.2"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.5"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.1.15.5"
      },
      {
        "model": "videoscape delivery system for internet streamer",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "1.0.0"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.19"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.1"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.17"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.0.17.6"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.15.2"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.19"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.7.3"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.2.9.3"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.5.11.2"
      },
      {
        "model": "application and content networking system software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "5.4"
      },
      {
        "model": "wide area application services",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "4.0.25"
      },
      {
        "model": "videoscape distribution suite for internet streaming",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.2.x"
      },
      {
        "model": "application and content networking system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.5.29.2"
      },
      {
        "model": "cds-is software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.1.x"
      },
      {
        "model": "cds-is software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.6.3.b50"
      },
      {
        "model": "ecds software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.5.6"
      },
      {
        "model": "wide area application services software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.0.3e"
      },
      {
        "model": "vds-oe software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.x"
      },
      {
        "model": "vds-sb software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.1.0-b96"
      },
      {
        "model": "vds-oe software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.0.1"
      },
      {
        "model": "cds-is software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.x"
      },
      {
        "model": "videoscape distribution suite for internet streaming",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.2.1.b9"
      },
      {
        "model": "wide area application services software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.1.x"
      },
      {
        "model": "application and content networking system",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "vds-sb software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.x"
      },
      {
        "model": "cds-is software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "3.1.2b54"
      },
      {
        "model": "vds-os software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "1.x"
      },
      {
        "model": "wide area application services software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.2.1"
      },
      {
        "model": "ecds software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "2.x"
      },
      {
        "model": "wide area application services software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.1.1c"
      },
      {
        "model": "wide area application services software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.2.x"
      },
      {
        "model": "application and content networking system",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "4.x"
      },
      {
        "model": "wide area application services software",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "5.x"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.5.17"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.5.11"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.5.7"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.2"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1.9"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.1"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0.5"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0.3"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0.1"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "5.0"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.11"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2.9"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.2"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.1.3"
      },
      {
        "model": "application \u0026 content networking software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "4.0.3"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "61543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.1:d:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:e:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:f:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.1:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.7:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.7:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.3:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.3:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:g:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.1:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.1:c:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:c:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.1.5:d:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.3.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.3.5:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.3.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.0.3:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.0.3:c:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.0.3:d:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.2.3:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.2.3:c:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.2.3:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.3:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.5:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.5:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.3:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.3:c:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.5:c:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.4.5:d:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.1.1:b:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.1.1:a:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:5.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:wide_area_application_services:4.0.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:internet_streamer_content_delivery_system:3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_distribution_suite_service_broker:1.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_distribution_suite_service_broker:1.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.7.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.2.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.2.11.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.3.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.5.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.3.15:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.4.3.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.4.5.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:2.5.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_delivery_system_for_internet_streamer:3.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_delivery_system_for_internet_streamer:3.2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.13.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.15.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.11.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.13.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.11.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.13.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.23:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.25:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_delivery_system_for_internet_streamer:1.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_distribution_suite_service_broker:1.1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.2.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.3.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.15.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.17.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.15.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.4.1.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.27:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:internet_streamer_content_delivery_system:2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:internet_streamer_content_delivery_system:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_distribution_suite_optimization_engine:1.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:videoscape_delivery_system_origin_server:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.11.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:4.2.13.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.7.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.0.9.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.5.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.1.7.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.4.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_system_software:5.5.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:enterprise_content_delivery_network_software:2.5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "61543"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-3444",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 9.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2013-3444",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.0,
            "id": "VHN-63446",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2013-3444",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201308-002",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-63446",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The web framework in Cisco WAAS Software before 4.x and 5.x before 5.0.3e, 5.1.x before 5.1.1c, and 5.2.x before 5.2.1; Cisco ACNS Software 4.x and 5.x before 5.5.29.2; Cisco ECDS Software 2.x before 2.5.6; Cisco CDS-IS Software 2.x before 2.6.3.b50 and 3.1.x before 3.1.2b54; Cisco VDS-IS Software 3.2.x before 3.2.1.b9; Cisco VDS-SB Software 1.x before 1.1.0-b96; Cisco VDS-OE Software 1.x before 1.0.1; and Cisco VDS-OS Software 1.x in central-management mode allows remote authenticated users to execute arbitrary commands by appending crafted strings to values in GUI fields, aka Bug IDs CSCug40609, CSCug48855, CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. plural Cisco Product Web Framework central management mode (central-management mode) Contains a vulnerability that allows arbitrary command execution. Vendors have confirmed this vulnerability Bug ID CSCug40609 , CSCug48855 , CSCug48921 , CSCug48872 , CSCuh21103 , CSCuh21020 ,and CSCug56790 It is released as.By a remotely authenticated user GUI An arbitrary command may be executed by adding a specially crafted string to the field value. Multiple Cisco Content Network and Video Delivery products are prone to a remote command-injection vulnerability because it fails to properly sanitize user-supplied input. \nSuccessfully exploiting this issue may allow an unprivileged attacker to  execute arbitrary commands on the affected system and completely  compromise the affected devices. \nThis issue is being tracked by Cisco bug IDs CSCug40609, CSCug48855,  CSCug48921, CSCug48872, CSCuh21103, CSCuh21020, and CSCug56790. Cisco Wide Area Application Services (WAAS) is a set of WAN link acceleration software from Cisco. This software is mainly used in the link environment with small bandwidth and large delay",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "BID",
        "id": "61543"
      },
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-3444",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "61543",
        "trust": 1.4
      },
      {
        "db": "SECUNIA",
        "id": "54367",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "54372",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "54369",
        "trust": 1.1
      },
      {
        "db": "SECUNIA",
        "id": "54370",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1028853",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1028852",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002",
        "trust": 0.7
      },
      {
        "db": "CISCO",
        "id": "20130731 AUTHENTICATED COMMAND INJECTION VULNERABILITY IN MULTIPLE CISCO CONTENT NETWORK AND VIDEO DELIVERY PRODUCTS",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-63446",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "db": "BID",
        "id": "61543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "id": "VAR-201308-0091",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:30:55.644000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "cisco-sa-20130731-cm",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130731-cm"
      },
      {
        "title": "30212",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=30212"
      },
      {
        "title": "cisco-sa-20130731-cm",
        "trust": 0.8,
        "url": "http://www.cisco.com/cisco/web/support/jp/111/1119/1119241_cisco-sa-20130731-cm-j.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-78",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130731-cm"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/61543"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1028852"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1028853"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/54367"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/54369"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/54370"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/54372"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86122"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-3444"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-3444"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "db": "BID",
        "id": "61543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "db": "BID",
        "id": "61543"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-08-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "date": "2013-07-31T00:00:00",
        "db": "BID",
        "id": "61543"
      },
      {
        "date": "2013-08-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "date": "2013-08-01T13:32:30.397000",
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "date": "2013-08-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-29T00:00:00",
        "db": "VULHUB",
        "id": "VHN-63446"
      },
      {
        "date": "2013-07-31T00:00:00",
        "db": "BID",
        "id": "61543"
      },
      {
        "date": "2013-08-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      },
      {
        "date": "2017-08-29T01:33:23.543000",
        "db": "NVD",
        "id": "CVE-2013-3444"
      },
      {
        "date": "2013-08-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Cisco Product  Web Framework arbitrary command execution vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-003631"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "operating system commend injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201308-002"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…