var-201310-0541
Vulnerability from variot
The Clientless SSL VPN feature in Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.7), 8.6.x before 8.6(1.12), 9.0.x before 9.0(2.6), and 9.1.x before 9.1(1.7) allows remote attackers to cause a denial of service (device reload) via crafted HTTPS requests, aka Bug ID CSCua22709. Vendors have confirmed this vulnerability Bug ID CSCua22709 It is released as.Skillfully crafted by a third party HTTPS Service disruption via request ( Device reload ) There is a possibility of being put into a state. An attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCua22709. The following versions are affected: Cisco Adaptive Security Appliance Software 8.x prior to 8.2(5.44), 8.3.x prior to 8.3(2.39), 8.4.x prior to 8.4(5.7), 8.6 prior to 8.6(1.12) .x version, 9.0.x version before 9.0(2.6), 9.1.x version before 9.1(1.7)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0541", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(4.4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(4.1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(5.35\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(3.9\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "8.2\\(5.38\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(4\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.2\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.2" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1.10\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(5\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(2.34\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(5.31\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(4.11\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(5.28\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(1.11\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.6\\(1\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.3" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.3\\(2.37\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(3\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0\\(2\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.1" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "9.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0.5" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.0" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "8.4\\(2.11\\)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.1(1.7)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.3(2.39)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.6.x" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.x" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.4.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.2(5.44)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.0.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.6(1.12)" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "9.0(2.6)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "9.1.x" }, { "model": "adaptive security appliance software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "8.4(5.7)" }, { "model": "adaptive security appliance software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "8.3.x" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "NVD", "id": "CVE-2013-5515" }, { "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.34\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.38\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(3.9\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.4\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.28\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(5.35\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0\\(5.31\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.3\\(2.37\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.2\\(4.1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1.11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(4.11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(5\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(2.11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4\\(3\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6\\(1.10\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:8.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-5515" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "62919" } ], "trust": 0.3 }, "cve": "CVE-2013-5515", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2013-5515", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-65517", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-5515", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201310-242", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-65517", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2013-5515", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65517" }, { "db": "VULMON", "id": "CVE-2013-5515" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "NVD", "id": "CVE-2013-5515" }, { "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Clientless SSL VPN feature in Cisco Adaptive Security Appliance (ASA) Software 8.x before 8.2(5.44), 8.3.x before 8.3(2.39), 8.4.x before 8.4(5.7), 8.6.x before 8.6(1.12), 9.0.x before 9.0(2.6), and 9.1.x before 9.1(1.7) allows remote attackers to cause a denial of service (device reload) via crafted HTTPS requests, aka Bug ID CSCua22709. Vendors have confirmed this vulnerability Bug ID CSCua22709 It is released as.Skillfully crafted by a third party HTTPS Service disruption via request ( Device reload ) There is a possibility of being put into a state. \nAn attacker can exploit this issue to cause an affected device to reload, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug ID CSCua22709. The following versions are affected: Cisco Adaptive Security Appliance Software 8.x prior to 8.2(5.44), 8.3.x prior to 8.3(2.39), 8.4.x prior to 8.4(5.7), 8.6 prior to 8.6(1.12) .x version, 9.0.x version before 9.0(2.6), 9.1.x version before 9.1(1.7)", "sources": [ { "db": "NVD", "id": "CVE-2013-5515" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "BID", "id": "62919" }, { "db": "VULHUB", "id": "VHN-65517" }, { "db": "VULMON", "id": "CVE-2013-5515" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5515", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2013-004649", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201310-242", "trust": 0.7 }, { "db": "CISCO", "id": "20131009 MULTIPLE VULNERABILITIES IN CISCO ASA SOFTWARE", "trust": 0.6 }, { "db": "BID", "id": "62919", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-65517", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2013-5515", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65517" }, { "db": "VULMON", "id": "CVE-2013-5515" }, { "db": "BID", "id": "62919" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "NVD", "id": "CVE-2013-5515" }, { "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "id": "VAR-201310-0541", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65517" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:09:00.676000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20131009-asa", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-asa" }, { "title": "SSL VPN Web Portal Denial of Service Vulnerability", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5515" }, { "title": "31107", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31107" }, { "title": "cisco-sa-20131009-asa", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/jp/111/1119/1119989_cisco-sa-20131009-asa-j.html" }, { "title": "Cisco: Multiple Vulnerabilities in Cisco ASA Software", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20131009-asa" } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-5515" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65517" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "NVD", "id": "CVE-2013-5515" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20131009-asa" }, { "trust": 1.2, "url": "http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2013-5515" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5515" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5515" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=31107" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65517" }, { "db": "VULMON", "id": "CVE-2013-5515" }, { "db": "BID", "id": "62919" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "NVD", "id": "CVE-2013-5515" }, { "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65517" }, { "db": "VULMON", "id": "CVE-2013-5515" }, { "db": "BID", "id": "62919" }, { "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "db": "NVD", "id": "CVE-2013-5515" }, { "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-13T00:00:00", "db": "VULHUB", "id": "VHN-65517" }, { "date": "2013-10-13T00:00:00", "db": "VULMON", "id": "CVE-2013-5515" }, { "date": "2013-10-09T00:00:00", "db": "BID", "id": "62919" }, { "date": "2013-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "date": "2013-10-13T10:20:04.380000", "db": "NVD", "id": "CVE-2013-5515" }, { "date": "2013-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-11-01T00:00:00", "db": "VULHUB", "id": "VHN-65517" }, { "date": "2016-11-01T00:00:00", "db": "VULMON", "id": "CVE-2013-5515" }, { "date": "2013-12-17T03:07:00", "db": "BID", "id": "62919" }, { "date": "2014-01-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004649" }, { "date": "2023-08-15T15:14:43.030000", "db": "NVD", "id": "CVE-2013-5515" }, { "date": "2013-10-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-242" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-242" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Adaptive Security Appliance Software Clientless SSL VPN Service disruption in functionality (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004649" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-242" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.