var-201505-0186
Vulnerability from variot

The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registration, which allows remote attackers to cause a denial of service (forwarding outage) via a crafted multicast packet, aka Bug ID CSCus74398. Vendors have confirmed this vulnerability Bug ID CSCus74398 It is released as. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlDenial of service operation via a specially crafted multicast packet by a third party ( Transfer stop ) There is a possibility of being put into a state. Cisco Adaptive Security Appliance Software is prone to a denial-of-service vulnerability. An attacker can exploit this issue to trigger a denial-of condition, denying service to legitimate users. Protocol Independent Multicast (PIM) application is a collection of multicast routing protocols. The vulnerability stems from the program not properly implementing the multicast-forwarding registration function. The following releases are affected: Cisco ASA Software Release 9.2(0.0), Release 9.2(0.104), Release 9.2(3.1), Release 9.2(3.4), Release 9.3(1.105), Release 9.3(2.100), Release 9.4(0.115), 100.13(0.21) version, 100.13(20.3) version, 100.13(21.9) version, 100.14(1.1) version

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201505-0186",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.3\\(1.105\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "100.14\\(1.1\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.2\\(0.0\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.2\\(3.1\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "100.13\\(20.3\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "100.13\\(21.9\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.3\\(2.100\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.2\\(0.104\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.4\\(0.115\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "cisco",
        "version": "9.2\\(3.4\\)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "9.3(2.100)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "9.3(1.105)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "9.2(3.4)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "9.2(0.104)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "9.2(0.0)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "100.14(1.1)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "100.13(20.3)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "cisco",
        "version": "100.13(0.21)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "cisco",
        "version": "100.13\\(0.21\\)"
      },
      {
        "model": "adaptive security appliance",
        "scope": null,
        "trust": 0.8,
        "vendor": "cisco",
        "version": null
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "100.13(21.9)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "9.2(3.1)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cisco",
        "version": "9.4(0.115)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "9.4.(0.115)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "9.2.(3.1)"
      },
      {
        "model": "adaptive security appliance software",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "cisco",
        "version": "100.12(21.9)"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "74750"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:cisco:adaptive_security_appliance_software:100.13\\(0.21\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:adaptive_security_appliance_software:100.13\\(20.3\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:adaptive_security_appliance_software:100.13\\(21.9\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.4\\(0.115\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:cisco:adaptive_security_appliance_software:9.2\\(3.4\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(3.1\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(2.100\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.104\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.2\\(0.0\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(1.105\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:cisco:adaptive_security_appliance_software:100.14\\(1.1\\):*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco",
    "sources": [
      {
        "db": "BID",
        "id": "74750"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-0742",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2015-0742",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-78688",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-0742",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201505-458",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-78688",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registration, which allows remote attackers to cause a denial of service (forwarding outage) via a crafted multicast packet, aka Bug ID CSCus74398. Vendors have confirmed this vulnerability Bug ID CSCus74398 It is released as. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlDenial of service operation via a specially crafted multicast packet by a third party ( Transfer stop ) There is a possibility of being put into a state. Cisco Adaptive Security Appliance Software is prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to trigger a denial-of condition, denying service to legitimate users. Protocol Independent Multicast (PIM) application is a collection of multicast routing protocols. The vulnerability stems from the program not properly implementing the multicast-forwarding registration function. The following releases are affected: Cisco ASA Software Release 9.2(0.0), Release 9.2(0.104), Release 9.2(3.1), Release 9.2(3.4), Release 9.3(1.105), Release 9.3(2.100), Release 9.4(0.115), 100.13(0.21) version, 100.13(20.3) version, 100.13(21.9) version, 100.14(1.1) version",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "BID",
        "id": "74750"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-0742",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "74750",
        "trust": 1.4
      },
      {
        "db": "SECTRACK",
        "id": "1032381",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458",
        "trust": 0.7
      },
      {
        "db": "SECUNIA",
        "id": "64621",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-78688",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "db": "BID",
        "id": "74750"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "id": "VAR-201505-0186",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:20:54.563000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "38937",
        "trust": 0.8,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38937"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38937"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/74750"
      },
      {
        "trust": 1.1,
        "url": "http://www.securitytracker.com/id/1032381"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0742"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0742"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/64621"
      },
      {
        "trust": 0.3,
        "url": "http://www.cisco.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "db": "BID",
        "id": "74750"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "db": "BID",
        "id": "74750"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-05-21T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "date": "2015-05-20T00:00:00",
        "db": "BID",
        "id": "74750"
      },
      {
        "date": "2015-05-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "date": "2015-05-21T10:59:02.067000",
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "date": "2015-05-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-01-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78688"
      },
      {
        "date": "2015-05-20T00:00:00",
        "db": "BID",
        "id": "74750"
      },
      {
        "date": "2015-05-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      },
      {
        "date": "2023-08-15T15:37:09.590000",
        "db": "NVD",
        "id": "CVE-2015-0742"
      },
      {
        "date": "2015-05-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cisco Adaptive Security Appliance Software  Protocol Independent Multicast Service disruption in applications  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-002769"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201505-458"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.