var-201506-0167
Vulnerability from variot
The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182. plural Cisco Run on device Cisco NX-OS Banner ( alias MOTD) Implementation of service disruption ( Reset the login process ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCuo10554 , CSCuu75466 , CSCuu75471 , CSCuu75484 , CSCuu75498 , CSCuu77170 ,and CSCuu77182 It is released as.By a third party TELNET Denial of service via unspecified terminal session request during session setup ( Reset the login process ) There is a possibility of being put into a state. A security hole exists in the banner implementation of Cisco Nexus and MDS's Cisco NX-OS. Cisco Nexus and Multilayer Director Switches are prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause a denial of service condition, denying service to legitimate users. This issue is being tracked by Cisco bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77182, and CSCuu77170
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201506-0167", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.0\\(2\\)n2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.2\\(0\\)zn\\(99.67\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "4.1\\(2\\)e1\\(1f\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(12\\)" }, { "model": "nexus 1000v", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": null }, { "model": "mds 9000 nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "6.2\\(11\\)" }, { "model": "mds nx-os software", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "90006.2(11)" }, { "model": "mds 9000 nx-os", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 1000v switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3016 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3048 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3064 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 31128pq switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3132q switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3164q switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3172 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3232c switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3264q switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3524 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3548 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 4001i switch module for ibm bladecenter", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 7000 series switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 7700 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 93120tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 93128tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9332pq switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9336pq aci spini switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9372px switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9372tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9396px switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9396tx switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9504 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9508 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 9516 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.1(2)e1(1f) (nexus 4000 series switch )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.2(1)sv3(2.1) (nexus 1000v switch )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.0(2)n2(2) (nexus 5000 series switch )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.2(11) (mds 9000 series switch )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.2(12) (nexus 7000 series switch )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.0(3) (nexus 9000 series switch )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.2(0)zn(99.67) (nexus 3000 series switch )" }, { "model": "nexus switch 5.2 sv3 base", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000v" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90007.0(3)" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.2(12)" }, { "model": "nx-os for nexus series 6.0 n2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "nx-os for nexus series 4.1 e1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4000" }, { "model": "nx-os for nexus series 7.2 zn", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "nexus switch 5.2 sv3", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "BID", "id": "75131" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "NVD", "id": "CVE-2015-0775" }, { "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1f\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zn\\(99.67\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_31128pq:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)n2\\(2\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:mds_9000_nx-os:6.2\\(11\\):*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0775" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "75131" } ], "trust": 0.3 }, "cve": "CVE-2015-0775", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0775", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2015-03886", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-78721", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0775", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-03886", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201506-240", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78721", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "VULHUB", "id": "VHN-78721" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "NVD", "id": "CVE-2015-0775" }, { "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The banner (aka MOTD) implementation in Cisco NX-OS 4.1(2)E1(1f) on Nexus 4000 devices, 5.2(1)SV3(2.1) on Nexus 1000V devices, 6.0(2)N2(2) on Nexus 5000 devices, 6.2(11) on MDS 9000 devices, 6.2(12) on Nexus 7000 devices, 7.0(3) on Nexus 9000 devices, and 7.2(0)ZN(99.67) on Nexus 3000 devices allows remote attackers to cause a denial of service (login process reset) via an unspecified terminal-session request during TELNET session setup, aka Bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77170, and CSCuu77182. plural Cisco Run on device Cisco NX-OS Banner ( alias MOTD) Implementation of service disruption ( Reset the login process ) There are vulnerabilities that are put into a state. Vendors have confirmed this vulnerability Bug ID CSCuo10554 , CSCuu75466 , CSCuu75471 , CSCuu75484 , CSCuu75498 , CSCuu77170 ,and CSCuu77182 It is released as.By a third party TELNET Denial of service via unspecified terminal session request during session setup ( Reset the login process ) There is a possibility of being put into a state. A security hole exists in the banner implementation of Cisco Nexus and MDS\u0027s Cisco NX-OS. Cisco Nexus and Multilayer Director Switches are prone to a denial-of-service vulnerability. \nAn attacker can exploit this issue to cause a denial of service condition, denying service to legitimate users. \nThis issue is being tracked by Cisco bug IDs CSCuo10554, CSCuu75466, CSCuu75471, CSCuu75484, CSCuu75498, CSCuu77182, and CSCuu77170", "sources": [ { "db": "NVD", "id": "CVE-2015-0775" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "BID", "id": "75131" }, { "db": "VULHUB", "id": "VHN-78721" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0775", "trust": 3.4 }, { "db": "SECTRACK", "id": "1032561", "trust": 1.1 }, { "db": "SECTRACK", "id": "1032562", "trust": 1.1 }, { "db": "BID", "id": "75131", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2015-003075", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201506-240", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-03886", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78721", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "VULHUB", "id": "VHN-78721" }, { "db": "BID", "id": "75131" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "NVD", "id": "CVE-2015-0775" }, { "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "id": "VAR-201506-0167", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "VULHUB", "id": "VHN-78721" } ], "trust": 1.563636375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" } ] }, "last_update_date": "2023-12-18T12:20:52.669000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "39280", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39280" }, { "title": "Patch for Cisco Nexus and MDS NX-OS Denial of Service Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/59748" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78721" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "NVD", "id": "CVE-2015-0775" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=39280" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032561" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1032562" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0775" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0775" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "VULHUB", "id": "VHN-78721" }, { "db": "BID", "id": "75131" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "NVD", "id": "CVE-2015-0775" }, { "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-03886" }, { "db": "VULHUB", "id": "VHN-78721" }, { "db": "BID", "id": "75131" }, { "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "db": "NVD", "id": "CVE-2015-0775" }, { "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-03886" }, { "date": "2015-06-12T00:00:00", "db": "VULHUB", "id": "VHN-78721" }, { "date": "2015-06-10T00:00:00", "db": "BID", "id": "75131" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "date": "2015-06-12T14:59:02.770000", "db": "NVD", "id": "CVE-2015-0775" }, { "date": "2015-06-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-06-19T00:00:00", "db": "CNVD", "id": "CNVD-2015-03886" }, { "date": "2017-01-04T00:00:00", "db": "VULHUB", "id": "VHN-78721" }, { "date": "2015-06-10T00:00:00", "db": "BID", "id": "75131" }, { "date": "2015-06-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003075" }, { "date": "2017-01-04T16:06:09.677000", "db": "NVD", "id": "CVE-2015-0775" }, { "date": "2015-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-240" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-240" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Run on device Cisco NX-OS Service disruption in the implementation of banners (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003075" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-240" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.